Explore >> Select a destination


You are here

palant.info
| | blog.blindspotsecurity.com
1.9 parsecs away

Travel
| | [AI summary] This article details how SQL Server Tabular Data Stream protocol communications can be vulnerable to man-in-the-middle attacks due to insecure default configurations and misleading vendor documentation.
| | soatok.blog
1.8 parsecs away

Travel
| | Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction...
| | www.mathieupassenaud.fr
1.4 parsecs away

Travel
| | [AI summary] The article argues for securing user accounts by minimizing the number of passwords stored and utilizing robust authentication protocols like OAuth, OpenID, and WebAuthn provided by major services, suggesting password managers and hardware keys as effective alternatives.
| | www.laurentluce.com
13.3 parsecs away

Travel
|