|
You are here |
greg.molnar.io | ||
| | | | |
dusted.codes
|
|
| | | | | SHA-256 is not a secure password hashing algorithm | |
| | | | |
willhaley.com
|
|
| | | | | zbarimg is a helpful command line tool that can take an image of a QR code and decode the underlying text represented by the code. zbarimg qr-code.png This is helpful if you want to decode a Google Authenticator TOTP (Time-based one time password), or any other sort of QR code content. It should be noted that saving the seed for TOTP codes may open you up to a security vulnerability, but there may be cases when you want this information. | |
| | | | |
myers.io
|
|
| | | | | Every so often I see posts on Stack Exchange, or Hacker News where someone has figured out that their passwords are being sent to the server and the server can see them! The logic that we see is that if the password is hashed client side, then only the hash needs to be sent to the server, so the server never knows the password. Unfortunately, I sometimes even see this go one step further when people suggest that with this arrangement, HTTPS isnt required. Wrong. | |
| | | | |
binarydebt.wordpress.com
|
|
| | | A key function of digital singatures is to ensure that the sender of a message is who he claims to be. In this post we will go in a step by step manner and cover the concepts behind digital certificates in simple terms. Consider two people named Alice and Bob sitting in front of their... | ||