Public Notes on
View Public Collections
Loading...
302 Found hackernoon.com
Writing secure code is hard. When you learn a language, a module or a framework, you learn how it supposed to be used. When thinking about security, you need to think about how it can be misused. via Pocket #IFTTT #Pocket #python #security #Unread #pub
Show More
Loading...
Anatomy of a GPG Key davesteele.github.io
#gpg #anatomy #pgp #gnupg #security #Documentation #key #keys #management #overview #pub
Show More
Loading...
creating passwords from dice? #password #security #encryption #passwords #passphrase #crypto #privacy #cryptography #diceware #reference #pub
Show More
Loading...
Loading...
Share a confidential note via a web link that will self-destruct after it is read by your intended recipient. #password #security #sharing #stronghold #secure #Unsorted #pub
Show More
Loading...
A confused deputy is a computer program that is innocently fooled by some other party into misusing its authority. It is a specific type of privilege escalation. via Pocket #IFTTT #Pocket #security #pub
Show More
Loading...
Workload isolation makes it harder for a vulnerability in one service to compromise every other part of the platform. It has a long history going back to 1990s qmail, and we generally agree that it’s a good, useful thing. via Pocket #IFTTT #Pocket #security #pub
Show More
Loading...
#docker #security #cheatsheet #hardening #Unread #via:popular #toread #pub
Show More
Loading...
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics. These cheat sheets were created by various application security professionals who have expertise in specific topics. We hope that this project provides you with excellent security guidance in an easy to read format. 😄 #cheatsheet #security #programming #cheat #sheet #reference #pub
Show More