Learn access keys from browser store using webcrypto api with practical examples, diagrams, and best practices. Covers javascript, security, internet-explorer development techniques with visual exp...
Learn using openssl to get the certificate from a server with practical examples, diagrams, and best practices. Covers linux, security, certificate development techniques with visual explanations.
Learn what's the purpose of each of the different uids a process can have? with practical examples, diagrams, and best practices. Covers linux, security, unix development techniques with visual exp...
Learn ata trusted commands-how to set libata allow_tpm with practical examples, diagrams, and best practices. Covers linux, security, ata development techniques with visual explanations.
Learn asp.net identity's default password hasher - how does it work and is it secure? with practical examples, diagrams, and best practices. Covers c#, asp.net, security development techniques with...
Learn best way to store user's avatars with practical examples, diagrams, and best practices. Covers php, mysql, image development techniques with visual explanations.
Learn password security requirements - exclude commonly used words and keybord patterns with practical examples, diagrams, and best practices. Covers regex, security, passwords development techniqu...
Learn what does dollar sign $ do in url? with practical examples, diagrams, and best practices. Covers security, url, web development techniques with visual explanations.
Learn what is the http header :host, :method, :path, :scheme, :version used for? with practical examples, diagrams, and best practices. Covers security, http, http-headers development techniques wi...
Learn why is it common to put csrf prevention tokens in cookies? with practical examples, diagrams, and best practices. Covers http, security, cookies development techniques with visual explanations.
Learn in amazon s3, what permissions do i need to get head on an object? with practical examples, diagrams, and best practices. Covers security, amazon-web-services, permissions development techniq...
Learn is it possible to identify a hash type? with practical examples, diagrams, and best practices. Covers security, hash development techniques with visual explanations.
Learn how does windows decide whether to display the uac prompt? with practical examples, diagrams, and best practices. Covers windows, security, windows-7 development techniques with visual explan...
Learn does typekit pose a security risk? with practical examples, diagrams, and best practices. Covers security, typekit development techniques with visual explanations.
Learn how secure is ibeacon? with practical examples, diagrams, and best practices. Covers ios, security, bluetooth-lowenergy development techniques with visual explanations.
Learn why is the maximum message size of the sha-1 hash function (2^64) - 1 bits? with practical examples, diagrams, and best practices. Covers security, hash, cryptography development techniques w...
Learn ctr cipher mode secret counter? with practical examples, diagrams, and best practices. Covers security, encryption, cryptography development techniques with visual explanations.