Explore >> Select a destination


You are here

dgroshev.com
| | notes.volution.ro
8.9 parsecs away

Travel
| | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms.
| | www.laurentluce.com
11.7 parsecs away

Travel
| |
| | littlemaninmyhead.wordpress.com
9.6 parsecs away

Travel
| | After doing hundreds of security code reviews for companies ranging from small start-ups to large banks and telcos, and after reading hundreds of stack overflow posts on security, I have composed a list of the top 10 crypto problems I have seen. Bad crypto is everywhere, unfortunately. The frequency of finding crypto done correctly is
| | www.talosintelligence.com
79.3 parsecs away

Travel
| Talos investigates software and operating system vulnerabilities in order to discover them before malicious threat actors do. We provide this information to vendors so that they can create patches and protect their customers as soon as possible.