CSV vs XML vs JSON – Which is the Best Response Data Format?
RecoverySoft / June 13, 2018

Whether you are building a thin client (web application) or thick client (client-server application) at some point you are probably making requests to a web server and need a good data format for responses. As of today, there are three major data formats being used to transmit data from a web server to a client: CSV, XML, and JSON. In order to develop an application with a solid architecture, it’s a good idea to understand the differences between each format and know when to use them. The purpose of this post is to define each data format, lay out the pros and cons for each, and discover which situations work best with each format. CSV CSV stands for “comma separated values”. As the name implies, this data format is basically a list of elements separated by commas. Let’s say that your response is sending back a list of people in a particular family. The format would look like this: Eric,Andrea,Kusco Pros – This format is the most compact of all three formats. Generally speaking, CSV formats are about half the size of XML and JSON formats. This is the major advantage of CSV because it can help reduce bandwidth Cons…

Super Shredder and Other File Shredders for Permanent File Deletion
RecoverySoft / June 1, 2018

When you delete a file from your computer, it may seem permanent and irreversible enough, but in fact it is not. It is still able to recover this data through a variety of means, using software designed for this purpose. This may be helpful for accidental deletions, but when private or confidential data is involved, this represents security vulnerability. File deletion works by just changing the tag on a particular file to the value 'deleted', and making it inaccessible from the default set of menus and directories. However, the data and the file itself actually remains on the hard disk, and only disappear when it is overwritten in the future by new data. But this overwriting may not happen until after the file data has already been recovered! In fact, some operating systems have a built-in UNDELETE command, which can easily recover recently deleted files. Here, this really is a big vulnerability that can be exploited by malicious parties to gain access to confidential or private information. An analogous problem arises in disposing of confidential paperwork, and the typical solution is to use so called paper shredders. These shredders tear the paper into fine strips which are then nearly impossible…