Explore >> Select a destination


You are here

blog.hboeck.de
| | soatok.blog
4.5 parsecs away

Travel
| | Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction...
| | loup-vaillant.fr
3.0 parsecs away

Travel
| | So you want to roll your own crypto. Well, be careful. Be very careful.
| | adsecurity.org
5.8 parsecs away

Travel
| | [AI summary] The article discusses the POODLE vulnerability in SSL 3.0, explaining its risks, exploitation scenarios, and mitigation strategies such as disabling SSL 3.0 and implementing TLS_FALLBACK_SCSV.
| | www.blazemeter.com
27.6 parsecs away

Travel
| What is Groovy used for? Learn more about Apache Groovy and its usage, plus take a closer look at the performance level of Groovy scripts.