Explore >> Select a destination


You are here

trendless.tech
| | pboyd.io
3.1 parsecs away

Travel
| | Here's a fun list to look through: Dumb Password Rules. Most of the rules seem arbitrary, like only allowing digits, but some hint at deeper problems. For instance, preventing single-quotes. They aren't inserting passwords into a database without a SQL placeholder, right? Nearly every site on that list has a needlessly short maximum password size. If they're storing passwords correctly, there's no need for this. This post will go through a few bad ways to store a password and you can see what I mean....
| | blog.elcomsoft.com
3.5 parsecs away

Travel
| | LUKS encryption is widely used in various Linux distributions to protect disks and create encrypted containers. Being a platform-independent, open-source specification, LUKS can be viewed as an exemplary implementation of disk encryption. Offering the choice of multiple encryption algorithms, severa
| | notes.volution.ro
3.3 parsecs away

Travel
| | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms.
| | codecapsule.com
23.8 parsecs away

Travel
| An exploration of the possible career paths for senior engineers, and what it takes to get there.