|
You are here |
soatok.blog | ||
| | | | |
notes.volution.ro
|
|
| | | | | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms. | |
| | | | |
www.sjoerdlangkemper.nl
|
|
| | | | | To securely store passwords they should be hashed with a slow hashing function, such as PBKDF2. PBKDF2 is slow because it calls a fast hash function many times. This blog post explores some properties that the iterations must have to be secure. | |
| | | | |
scottarc.blog
|
|
| | | | | Head's up: This is a blog post about applied cryptography, with a focus on web and cloud applications that encrypt data at rest in a database or filesystem. While the lessons can be broadly applicable, the scope of the post is not. One of the lessons I learned during my time at AWS Cryptography (and... | |
| | | | |
www.webinspector.com
|
|
| | | Website Malware Scanner helps to make free website scanning and protects against hacks and malware. Try Webinspector to detect website malware now | ||