|
You are here |
healeycodes.com | ||
| | | | |
www.2uo.de
|
|
| | | | | [AI summary] A technical deep-dive that debunks common myths about the Linux /dev/urandom and /dev/random devices, arguing that /dev/urandom is the preferred and secure choice for cryptographic applications on modern systems. | |
| | | | |
paragonie.com
|
|
| | | | | A lesson on cryptographically secure pseudorandom number generators in PHP, and how to generate random integers and strings from a high quality entropy source like /dev/urandom to generate secure random passwords in PHP. | |
| | | | |
sergioprado.blog
|
|
| | | | | In this article, we will deep dive into the major concepts behind random numbers and learn how to work with them on a Linux system. | |
| | | | |
jmmv.dev
|
|
| | | In a recent work discussion, I came across an argument that didn't sound quite right. The claim was that we needed to set up containers in our developer machines in order to run tests against a modern glibc. The justifications were that using LD_LIBRARY_PATH to load a different glibc didn't work and statically linking glibc wasn't possible either. But... running a program against a version of glibc that's different from the one installed on the system seems like a pretty standard requirement, doesn't it?... | ||