From <a href="http://mindprod.com/jgloss/unmain.html" rel="nofollow">http://mindprod.com/jgloss/unmain.html</a>:<p>> I would like to remind you this essay is copyrighted material. It is illegal to repost it without permission. I will usually give you that permission if you translate the essay into another language and if you provide a link back to the English-language original. I do this for three reasons.<p><pre><code> 1. That way any change I make to the essay is instantly reflected in any English-language copy anyone reads.
2. That way the formatting and images are preserved. Pirated copies usually screw up the formatting.
3. Google ad revenue from this essay is the main source of income from the website. It pays to keep me on the air.
</code></pre>
I don't understand how the creator of this GitHub repo could miss this, it's the first thing in the original article...
"Hungarian Notation is the tactical nuclear weapon of source code obfuscation techniques"<p>...never a truer word was said.<p>(<a href="http://www.joelonsoftware.com/articles/Wrong.html" rel="nofollow">http://www.joelonsoftware.com/articles/Wrong.html</a>)
I had the pleasure of dealing with C++ classes with a dozen or more gratuitously overloaded operators, including overloaded cast operators. You'd cast an object to a certain type in order to access a member of that type, instead of accessing that member in a normal way. I never doubted for a second that it was all done for job security, this stuff is real.
no, he missed one obfuscation trick that should be quite natural in java land - just create deep nested class hierarchies that serve no apparent purpose - AbstractSingletonProxyFactoryBean for everybody; no hope to understand what is going on here.