Explore >> Select a destination


You are here

healeycodes.com
| | www.2uo.de
2.3 parsecs away

Travel
| | [AI summary] A technical deep-dive that debunks common myths about the Linux /dev/urandom and /dev/random devices, arguing that /dev/urandom is the preferred and secure choice for cryptographic applications on modern systems.
| | paragonie.com
2.3 parsecs away

Travel
| | A lesson on cryptographically secure pseudorandom number generators in PHP, and how to generate random integers and strings from a high quality entropy source like /dev/urandom to generate secure random passwords in PHP.
| | sergioprado.blog
2.8 parsecs away

Travel
| | In this article, we will deep dive into the major concepts behind random numbers and learn how to work with them on a Linux system.
| | jmmv.dev
26.8 parsecs away

Travel
| In a recent work discussion, I came across an argument that didn't sound quite right. The claim was that we needed to set up containers in our developer machines in order to run tests against a modern glibc. The justifications were that using LD_LIBRARY_PATH to load a different glibc didn't work and statically linking glibc wasn't possible either. But... running a program against a version of glibc that's different from the one installed on the system seems like a pretty standard requirement, doesn't it?...