|
You are here |
www.thepolyglotdeveloper.com | ||
| | | | |
dgroshev.com
|
|
| | | | | [AI summary] The author discusses the challenges and solutions for implementing a secure, privacy-preserving BitTorrent connectivity testing tool using cryptographic techniques like asymmetric encryption and HMAC to protect user IP addresses. | |
| | | | |
pboyd.io
|
|
| | | | | Here's a fun list to look through: Dumb Password Rules. Most of the rules seem arbitrary, like only allowing digits, but some hint at deeper problems. For instance, preventing single-quotes. They aren't inserting passwords into a database without a SQL placeholder, right? Nearly every site on that list has a needlessly short maximum password size. If they're storing passwords correctly, there's no need for this. This post will go through a few bad ways to store a password and you can see what I mean.... | |
| | | | |
www.zend.com
|
|
| | | | | Libsodium is a modern cryptography library. Learn how you can use the Libsodium cryptography library for PHP encryption. | |
| | | | |
dataprot.net
|
|
| | | Login credentials enable us to access any private or restricted system, account, or device. At a minimum, they include a username & password. | ||