Explore >> Select a destination


You are here

blog.fredrb.com
| | www.pl-enthusiast.net
5.9 parsecs away

Travel
| | This blog post is the first in my series on secure computationand will be presented in two parts. It briefly introduces some work my collaborators and I published this year, which illustrates a pleasant application of programming languages ideas to ... Continue reading ?
| | benhoyt.com
2.5 parsecs away

Travel
| | An explanation of how to implement a simple hash table data structure, with code and examples in the C programming language.
| | attractivechaos.wordpress.com
3.6 parsecs away

Travel
| | Array and hash table are probably the most important data structures. Some programming languages such as Perl, Lua and Javascript, almost build the language core on top of the two data structures. While array is straightforward to implement, hash table is not. This is why we have paid continuous efforts in improving the hash table...
| | pboyd.io
33.3 parsecs away

Travel
| Here's a fun list to look through: Dumb Password Rules. Most of the rules seem arbitrary, like only allowing digits, but some hint at deeper problems. For instance, preventing single-quotes. They aren't inserting passwords into a database without a SQL placeholder, right? Nearly every site on that list has a needlessly short maximum password size. If they're storing passwords correctly, there's no need for this. This post will go through a few bad ways to store a password and you can see what I mean....