|
You are here |
blog.hboeck.de | ||
| | | | |
www.daemonology.net
|
|
| | | | | ||
| | | | |
soatok.blog
|
|
| | | | | Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction... | |
| | | | |
adsecurity.org
|
|
| | | | | [AI summary] The article discusses the POODLE vulnerability in SSL 3.0, explaining its risks, exploitation scenarios, and mitigation strategies such as disabling SSL 3.0 and implementing TLS_FALLBACK_SCSV. | |
| | | | |
blog.heckel.io
|
|
| | | My name is Philipp C. Heckel and this is my tech blog. I mostly write about security, synchronization and scripting in the world of Linux, Java and PHP. | ||