Skip to content
Naman on GitHub Naman on Twitter

CS 373 Spring 2024: Naman Arora

Naman Arora

What did you do this past week?

This week I continued working on the IDB project with my team for my SWE class. I also began the Life project for my OOP class.

What's in your way?

I am actually pretty caught up work wise, but I do have a test next week that I need to prepare for.

What will you do next week?

Next week, I will continue working on the IDB project for SWE and continue working on the Life project in OOP. I also plan to prepare for my tests.

What did you think of Paper #12. Why extends is evil?

The paper argues that implementation inheritance through extends tightly couples classes in a way that makes code fragile and inflexible. Instead, the article advocates using interface inheritance through "implements" and programming to interfaces rather than concrete classes.

What did you think of SQL joins, SQL subqueries and refactoring?

  • SQL JOINs are used to combine rows from two or more tables based on related columns between them. There are different types of JOINs:
    • INNER JOIN: Returns rows when there is a match in both tables.
    • LEFT JOIN: Returns all rows from the left table and matching rows from the right table.
    • RIGHT JOIN: Returns all rows from the right table and matching rows from the left table.
    • FULL JOIN: Returns rows when there is a match in one of the tables.
  • In SQL, subqueries (also known as nested queries or inner queries) are queries nested within another SQL statement, such as SELECT, INSERT, UPDATE, or DELETE. Subqueries are enclosed within parentheses and are used to return data that will be used in the main query's criteria.

Code refactoring is the process of restructuring existing code without changing its external behavior to improve readability, maintainability, and sometimes even performance. Refactoring aims to make code cleaner, more understandable, and easier to maintain.

What made you happy this week?

This week, my friends and I met together to go boating, which was a very enjoyable experience.

What’s your pick-of-the-week or tip-of-the-week?

Researchers have discovered that highly skilled hackers have been exploiting an unpatched zero-day vulnerability in Palo Alto Networks firewalls for at least two weeks. The vulnerability allows unauthenticated remote code execution with root privileges on affected devices. A threat group known as UTA0218 has been seen leveraging the bug to deploy custom malware on targeted networks. While only one group is actively using it so far, researchers warn that many more will likely start exploiting it once details are more widely known. Palo Alto has not yet released a patch but recommends workarounds and detections. The vulnerability is severe and easy to exploit, earning a maximum CVSS score of 10.0. “Highly capable” hackers root corporate networks by exploiting firewall 0-day | Ars Technica