Codebook
web
programming languages
security
management
games
book
algorithms
visualization
graphics
story
web
bug bounties
cyphers
two factor authentication
ethics
privacy
mongodb
ssl encryption
hardware
EXFiLTRATED
security
penetration testing
facebook
bug bounties
remote code execution
ethics
It's Still the Data, Stupid!
security
mongodb
publicly available
authentication
access control
misconfiguration
Schwab password policies and two factor authentication: a comedy of errors « Jeremy Tunnell
security
password authentication
two factor authentication
How a bug in Visual Studio 2015 exposed my source code on GitHub and cost me $6,500 in a few hours
security
software bug
hackers
aws
Let's Encrypt is Trusted - Let's Encrypt - Free SSL/TLS Certificates
security
ssl encryption
https
tls
free certificates
ssl certificates
I was just asked to crack a program in a job interview !
security
software hacking
cracking
guide
This is the code Comcast is injecting into its users web traffic. · GitHub
security
ethics
malware
isp
network
Detectify Labs
security
web
extensions
privacy
Inside the precision hack | Music Machinery
security
voting hack
Creative usernames and Spotify account hijacking | Labs
security
web
unicode
text canonicalization
Sprites mods - Hard disk hacking - Intro
security
hardware
hard drive
root exploit
A Stick Figure Guide to the Advanced Encryption Standard (AES)
security
visualization
symmetric encryption
cyphers
block ciphers
aes
How I Hacked Your Facebook Photos - Deleting any photo albums | 7xter
security
bug bounties
api
oauth
4 HTTP Security headers you should always be using | ibuildings
security
web
headers
sr-captcha/index.md at gh-pages · mieko/sr-captcha · GitHub
security
captcha
silk road
automation
How Google Authenticator Works
security
web
two factor authentication
google authenticator
When Random Isn't Random Enough: Lessons from an Online Poker Exploit - Laura Diane Hamilton
security
random
poker
How Chinese Tinder clone screws you ⢠Larry Salibra
security
privacy
tinder
china
A (relatively easy to understand) primer on elliptic curve cryptography | Ars Technica
security
cyphers
cryptography
elliptic curve cryptography