|
You are here |
blog.hboeck.de | ||
| | | | |
soatok.blog
|
|
| | | | | Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction... | |
| | | | |
loup-vaillant.fr
|
|
| | | | | So you want to roll your own crypto. Well, be careful. Be very careful. | |
| | | | |
adsecurity.org
|
|
| | | | | [AI summary] The article discusses the POODLE vulnerability in SSL 3.0, explaining its risks, exploitation scenarios, and mitigation strategies such as disabling SSL 3.0 and implementing TLS_FALLBACK_SCSV. | |
| | | | |
www.blazemeter.com
|
|
| | | What is Groovy used for? Learn more about Apache Groovy and its usage, plus take a closer look at the performance level of Groovy scripts. | ||