|
You are here |
blog.stephencleary.com | ||
| | | | |
muhammadraza.me
|
|
| | | | | In this post, we will understand how an HTTP server works by implementing one in Python. | |
| | | | |
www.softdevtube.com
|
|
| | | | | Programming history is filled with bugs that turned out to be features and limitations that pushed developers to make even more interesting products. We'll journey through code that was so 'bad' it was actually good. Along the way we'll look at the important role failure plays in learning. Then we'll tame our inner perfectionists and | |
| | | | |
tweedegolf.nl
|
|
| | | | | For the last couple of months we at Tweede golf have been working on implementing a Network Time Protocol (NTP) client and server in Rust. The project is a Prossimo initiative and is supported b ... | |
| | | | |
juliaferraioli.com
|
|
| | | 2-Factor Authentication (2FA) or Multi-Factor Authentication (MFA) are ways of securing accounts above and beyond normal password protection. Typically, we think of 2FA as something you know (your password) and something you have (a device). The idea is that if you compromise one, you still cant get access to the protected resource. A room protected by a keypad and ID card reader is a great example of 2FA. You might be able to guess the code, but youd also need a valid ID card to get access to the locked... | ||