Skip to content

Development at ProgramTom Dot Com

Place for coding, programming, development and software in general

Menu
  • Blog
  • PDF Booklets
  • Dev Utils
  • Java Spring Boot Or Web Apps
  • EnglishEnglish
    • българскибългарски
    • EnglishEnglish
    • EspañolEspañol
Menu
Best Practices are about Pain Reduction

Best Practices are about Pain Reduction

Posted on May 11, 2023May 11, 2023 by Toma Velev

Experience and understanding of Best Practices is archived through Pain even in the Information Technology Field. Embracing them – may lead to Pain Reduction – in the long term.

Security

S stands for Security in IOT. If you are value creator, you think more – how to serve the public, how to create value, how to stay above the sea level – financially and so on. Security is a necessary for all things to continue working, but your focus is not on them. And sometimes – things may go off the road because of it. 

Passwords

The best practices for passwords are:

  • Change them in some period
  • Have different passwords for every service

So – even if some particular service leaks – you will not have high priority task – to change passwords everywhere. You may use BCrypt with high complexity factor, but you don’t know, if other services don’t use sha512, or even md5. In the end all hashing is breakable – given enough time and computing power. The thing is – how bad it will be – when it does.

Two pass authentication

Second pass authentication is already public standard for know and unknown platforms. If you use any service that does not have it, be on thorns.

Lock your screen 

Nowadays – any modern enough device has biometrics – and you can log in with simple biometrics. Locking your device is a no-brainer – when you could unlock with simple finger or face. This also allows to put long password, so it will be hard to crack.

Encrypt Sensitive data

All big Operating Systems offer some option for encrypting a folder or even – the whole hard disk. This makes getting into your data after theft – a little bit more complex for non-expert hacker.  

Location Based Security

The device you carry should be corresponding to the place you are.

Office – When you are in the working place – it is of highest security. Office buildings are guarded by paid guards. 

Home – Your living place should still be considered relatively safe. But, from a corporate perspective – it is less secure. Few homes have Paid Security Guards. The company devices you may keep – may be accessed by relatives – close or distant – to the employee of the corporation. 

Any Other place – On any other place – you should NOT carry any high value device. The best approach will be to carry low-level – entry device. There are 100$ Android Devices nowadays – that could have Internet Access, GPS, Mobile Internet and even Biometrics. 

Goal of Software

As I’ve written before. The ultimate goal of software is to make everything accessible from anywhere. 

  • Have everything – as Web Based Services
  • all accessible through mobile – responsive or though apps
  • the possibility to execute your work on any device. 

Remote Control Services

There are cheap laptops nowadays – that you could carry and not feel pain – if lost. And there are multiple Applications and Services that offer remote control. They are another point of failure of course, but, in general, they offer to now expose devices to location insecurity. 

Best Practices in Coding 

SOLID

Solid, Reusable and Architecture Components,  and Software Layering are Best Practices that allow: 

  • Work by multiple developers
  • Archive good Unit Testing & Code Coverage 
  • Less code lines changes – when changes in functionalities.  
  • And many more…

Ultimately – all the benefits of good practices are experiences through pain. It is principle that rains all fields and IT included.

Image Source: https://pixabay.com/illustrations/woman-burnout-multitasking-face-1733881/ 

  • What the market wants from a Flutter Developer?
  • Design tools Figma (& others) & Flutter Development
  • Why would someone need an app and especially developed with Flutter
  • How Secure is Flutter?
  • Flutter – the current latest Evolution of Google Android User Interface Building

Categories

  • Apps (10)
  • ChatGPT (5)
  • Choosing a Framework (32)
  • Flutter (61)
  • Graphical User Interface (10)
  • Marketing (92)
  • Software Development (154)
  • Spring (1)
  • StartUp (17)
  • Uncategorized (1)

Tags

Algorithms (9) crypto (29) flutterdev (39) General (86) Java (7) QR & Bar Codes (3) Software Dev Choices (33) Spring Boot (1) standards (1) Theme (3) User Authentication & Authorization (9) User Experience (10) Utilities (19) WordPress (11)

Product categories

  • All Technologies (33)
    • Flutter (11)
    • Java (10)
    • Native Android (3)
    • PHP (6)
    • Spring (Boot) Framework (4)
    • Utils (10)
    • Vaadin 8 (1)
  • Apps (14)
    • Employees DB (1)
    • Notes (5)
    • Personal Budget (1)
    • Recipes Book (1)
    • Stuff Organizer (1)
    • To-Do (1)
  • PDF Books (3)
  • Source Code Generators (4)

Recent Posts

  • What the market wants from a Flutter Developer?
  • Design tools Figma (& others) & Flutter Development
  • Why would someone need an app and especially developed with Flutter
  • How Secure is Flutter?
  • Flutter – the current latest Evolution of Google Android User Interface Building

Post Categories

  • Apps (10)
  • ChatGPT (5)
  • Choosing a Framework (32)
  • Flutter (61)
  • Graphical User Interface (10)
  • Marketing (92)
  • Software Development (154)
  • Spring (1)
  • StartUp (17)
  • Uncategorized (1)
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}