You are here |
greg.molnar.io | ||
| | | |
myers.io
|
|
| | | | Every so often I see posts on Stack Exchange, or Hacker News where someone has figured out that their passwords are being sent to the server and the server can see them! The logic that we see is that if the password is hashed client side, then only the hash needs to be sent to the server, so the server never knows the password. Unfortunately, I sometimes even see this go one step further when people suggest that with this arrangement, HTTPS isnt required. Wrong. | |
| | | |
vin01.github.io
|
|
| | | | Meet Gitlab CI Lint API | |
| | | |
willhaley.com
|
|
| | | | zbarimg is a helpful command line tool that can take an image of a QR code and decode the underlying text represented by the code. zbarimg qr-code.png This is helpful if you want to decode a Google Authenticator TOTP (Time-based one time password), or any other sort of QR code content. It should be noted that saving the seed for TOTP codes may open you up to a security vulnerability, but there may be cases when you want this information. | |
| | | |
seekinglavenderlane.com
|
|
| |