|
Excellent catch!
Try to find out fool in a deal. If you can't find one, it's you.
|
|
|
|
|
.
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
Site driving to a hackathon: Petushka - Professional Profile[^]
Sent from my Amstrad PC 1640
Never throw anything away, Griff
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
Spammer terminated.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
|
.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
|
|
Gone
Thanks
Happy Coding
|
|
|
|
|
Wants to "Buy your Apple enterprise developer account": Member 13994427 - Professional Profile[^]
Sent from my Amstrad PC 1640
Never throw anything away, Griff
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
Gone
Thanks
Happy Coding
|
|
|
|
|
|
|
Looking at Web Application Security Thoughts
The content seems similar as in
Note that some of the sources are mentioned in references but not all.
Then looking at another article RSA Encryption using C#.NET
The other articles are older so harder to check.
What comes to the articles mentioned above, I'd go for plagiarism but after that? Your thoughts?
modified 29-Sep-18 6:16am.
|
|
|
|
|
First one: stolen.
Second one: stolen. The source would appear to be a 2009 thesis form Washington U: https://sites.math.washington.edu/~morrow/336_09/papers/Yevgeny.pdf[^] The first paragraph is clearly tweaked from the original:
His: In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman developed an algorithm as a cryptographic algorithm, which
Orig: In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which
Diff: "introduced" becomes "developed an algorithm as"
His: was essentially to replace the less secure National Bureau of Standards (NBS) algorithm. Most
Orig: was essentially to replace the less secure National Bureau of Standards (NBS) algorithm. Most impor-
Diff: Line break.
His: importantly, RSA implements a public-key cryptosystem, as well as digital signatures or private key.
Orig: tantly, RSA implements a public-key cryptosystem, as well as digital signatures.
Diff: Addition of redundant drivel.
"His" other recent article: Performance optimization of c# application[^] Is copied from here: Code Optimization[^] and tweaked to hide it. You can see which bit's he authored as the grasp of English degrades...
And I've seen that face before, somewhere...
Sent from my Amstrad PC 1640
Never throw anything away, Griff
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
modified 23-Sep-18 3:25am.
|
|
|
|
|
Seems like a clear case
About the last paragraph in your post, both links seem to point to the same article. If you still have the link to the original article, could you include that. Just to see where the article was copied from.
|
|
|
|
|
Oops! Fixed - sorry about that, I was just starting my first of the day...
Sent from my Amstrad PC 1640
Never throw anything away, Griff
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
|
The remaining three articles I suspect were plagiarised purely from the quality of the English - the bits he added to the newer ones are nowhere near the quality of the older ones - but it's way too late to prove one way or the other, unfortunately (given just how much plagiarism goes on these days).
Sent from my Amstrad PC 1640
Never throw anything away, Griff
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
My thoughts exactly
Looking at Asynchronous Programming Features and Models in .NET Framework 4.0 & 4.5 which is an older one but if I compare it to Async in C# 5.0: Unleash the Power of Async - Alex Davies - Google-books published in 2012
In chapter "What is async and await"
Article: The feature makes asynchronous programming a lot easier by eliminating the need for complex patterns that were necessary in previous versions of C#. With it, we can reasonably write entire programs in an asynchronous style.
Book: The feature makes asynchronous programming a lot easier by eliminating the need for complex patterns that were necessary in previous versions of C#. With it, we can reasonably write entire programs in an asynchronous style.
Article: I said already that asynchronous programming has always been possible in C#, but it involved a lot of manual work from the programmer.
Book: Asynchronous programming has always been possible in C#, but it involved a lot of manual work from the programmer.
Then if I search for the following paragraph from the article
Thread pools are often employed in server applications. Each incoming request is assigned to a thread from the thread pool, so that the request can be processed asynchronously, without tying up the primary thread or delaying the processing of subsequent requests
I get numerous exact hits, many of them dated before the article.
So based on this, I suspect that a lot of the texts have been copied from elsewhere (possibly tweaked a bit).
|
|
|
|
|
|
|
.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
|