|
You are here |
palant.info | ||
| | | | |
blog.blindspotsecurity.com
|
|
| | | | | [AI summary] This article details how SQL Server Tabular Data Stream protocol communications can be vulnerable to man-in-the-middle attacks due to insecure default configurations and misleading vendor documentation. | |
| | | | |
soatok.blog
|
|
| | | | | Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction... | |
| | | | |
www.mathieupassenaud.fr
|
|
| | | | | [AI summary] The article argues for securing user accounts by minimizing the number of passwords stored and utilizing robust authentication protocols like OAuth, OpenID, and WebAuthn provided by major services, suggesting password managers and hardware keys as effective alternatives. | |
| | | | |
www.laurentluce.com
|
|
| | | |||