|
You are here |
www.da.vidbuchanan.co.uk | ||
| | | | |
www.mitls.org
|
|
| | | | | This page describes the miTLS verified TLS implementation and presents attacks, such as Triple Handshake, SMACK, FREAK, Logjam, and SLOTH | |
| | | | |
crackstation.net
|
|
| | | | | How to hash passwords properly using salt. Why hashes should be salted and how to use salt correctly. | |
| | | | |
notes.volution.ro
|
|
| | | | | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms. | |
| | | | |
aradaelli.com
|
|
| | | [AI summary] The author discusses their experience with the programming language D, highlighting its features, advantages over C/C++, and reasons for preferring it despite its niche status. | ||