Explore >> Select a destination


You are here

blog.plataformatec.com.br
| | www.binovarghese.com
7.5 parsecs away

Travel
| | Session and token authentication methods are used by the server to verify the client request is authenticated or not.
| | www.sjoerdlangkemper.nl
9.2 parsecs away

Travel
| | Cookies are typically sent to third parties in cross origin requests. This can be abused to do CSRF attacks. Recently a new cookie attribute was proposed to disable third-party usage for some cookies, to prevent CSRF attacks. This post will describe the same-site cookie attribute and how it helps against CSRF.
| | www.rasikjain.com
9.1 parsecs away

Travel
| | Here are three scenarios for implementing authentication workflows. Internet Applications (Public facing) For internet web applications and APIs, Session based (SessionID cookie) and Token Based (JWT) Authentication can be implemented. Session Based: Implemented for a majority of traditional and stateful web applications. Once the user is authenticated, A Session state is created and stored in an external State server or SQL database. The Session state is identified by a unique SessionID....
| | techtldr.com
81.9 parsecs away

Travel
| Guillermo Rauch (Socket.io, Mangoose.js, Hyper.js, Now) is the guy to watch, and last night he did not disappoint. The following tweet announced pkg - a simple tool to generate a native executable file from Node.js code targeting Mac, Linux, and Windows. Introducing `pkg` Single command binary compilation for Node.js pic.twitter.com/Dbe9L1gb0x - ZEIT (@zeithq) April 29, [...]