You are here |
dgroshev.com | ||
| | | |
notes.volution.ro
|
|
| | | | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms. | |
| | | |
www.laurentluce.com
|
|
| | | | ||
| | | |
littlemaninmyhead.wordpress.com
|
|
| | | | After doing hundreds of security code reviews for companies ranging from small start-ups to large banks and telcos, and after reading hundreds of stack overflow posts on security, I have composed a list of the top 10 crypto problems I have seen. Bad crypto is everywhere, unfortunately. The frequency of finding crypto done correctly is | |
| | | |
www.talosintelligence.com
|
|
| | Talos investigates software and operating system vulnerabilities in order to discover them before malicious threat actors do. We provide this information to vendors so that they can create patches and protect their customers as soon as possible. |