|
You are here |
blog.teamleadnet.com | ||
| | | | |
my-it-notes.com
|
|
| | | | | Few observations in regards to hash usage, in projects where data volume and spikes in load shift engineering from the KISS paradigm to the extent where you have to really care about underlying technologies and data structures. There are different hash functions tailored for different use cases - quick pattern matching in Rabin-Karp algorithm, prefix ... | |
| | | | |
www.adamconrad.dev
|
|
| | | | | Follow along with Steven Skiena's Fall 2018 algorithm course applied to the JavaScript language. | |
| | | | |
pboyd.io
|
|
| | | | | Here's a fun list to look through: Dumb Password Rules. Most of the rules seem arbitrary, like only allowing digits, but some hint at deeper problems. For instance, preventing single-quotes. They aren't inserting passwords into a database without a SQL placeholder, right? Nearly every site on that list has a needlessly short maximum password size. If they're storing passwords correctly, there's no need for this. This post will go through a few bad ways to store a password and you can see what I mean.... | |
| | | | |
dzone.com
|
|
| | | We examine cookie and token-based authentication, advantages of using tokens, and address common questions developers have regarding token-based auth. | ||