Skip to content
loading...

Understanding Hacking 101...

Reactions 52 Comments 8
3 min read

Generating Random Password in Python - Practical Guide

Reactions 5
7 min read

Secure Ninja Forms in Wordpress

Reactions 3
7 min read

PGP Subkeys for Keybase

Reactions 4
3 min read

Will Banning Cryptography Keep the Country Safe?

Reactions 11
3 min read

The risk of unprotected private keys (orbjet.org)

Reactions 4
1 min read

#Hash Vs Encryption?

Reactions 13 Comments 1
3 min read

Oracle TDE

Reactions 4
1 min read

Encrypt Data With Asymmetric AWS KMS in 5 minutes or less

Reactions 8
4 min read

Auto-mounting encrypted drives with a remote key on Linux

Reactions 4
8 min read

Use strong encryption and hashing algorithms in Java

Reactions 15 Comments 3
2 min read

#helpWhere to use encryption 🤔

Reactions 8 Comments 2
1 min read

Signing Your Work as a Developer

Reactions 6
4 min read

What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

Reactions 14
22 min read

KeePass: SSH keys passwords storage and decryption on Linux

Reactions 15
4 min read

Introducing Certera

Reactions 6
4 min read

Encrypted Contact Form in Vue

Reactions 6 Comments 2
5 min read

How Facebook Avoids Ad Blockers

Reactions 11
3 min read

Securely sending Emails from static sites with a 3rd party API

Reactions 7
5 min read

How to encrypt a string in Java using RSA and decrypt it in Python

Reactions 9
2 min read

How to Share Google Docs Securely with a Google Apps Script

Reactions 4
9 min read

Encrypted Alternative to Google Photo

Reactions 6
2 min read

Hide Your Keys Hide Your Wife!

Reactions 11
5 min read

Initramfs: Dropping to a Shell

Reactions 4
4 min read

Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

Reactions 12 Comments 1
9 min read

Today I Was Confused — AES/CBC/PKCS5PADDING

Reactions 5
3 min read

#showdevWe created FileKit - The end-to-end encrypted file transfer toolkit for Javascript

Reactions 6
3 min read

#explainlikeimfiveIs it still safe for large production applications with a large user base to use bcrypt as the password hashing algorithm ?

Reactions 8 Comments 3
1 min read

How To Encrypt Multiple Files With Travis CI

Reactions 11
3 min read

(Very) Basic Intro to the Scrypt Hash

Reactions 4
3 min read

Dual Encryption

Reactions 3
2 min read

Encrypt your disks

Reactions 4
2 min read

Resize LVM on LUKS partition without messing everything up

Reactions 4
4 min read

Encryption and Decryption with Python Azure Functions

Reactions 4
6 min read

Decrypting boot drives remotely using dropbear

Reactions 5
3 min read

How to capture code snippets on the web and store them securely with just one click?

Reactions 4
1 min read

Encryption with a Funky Partition Layout

Reactions 10
3 min read

Cryption - In-Browser AES File Encryption 🔐 with Data Integrity Check 🔍built with React and Redux

Reactions 4 Comments 1
1 min read

10 best practices to protect your users’ data (and why they’re still not sufficient)

Reactions 57 Comments 7
5 min read

Encrypting your users’ data is no longer optional

Reactions 42 Comments 2
6 min read

libVES: End-to-End Encryption API. Encrypt Everything without fear of losing the Key

Reactions 11
1 min read

How to Securely Store a Password in Java

Reactions 108 Comments 17
11 min read

Editing an encrypted script.

Reactions 6
1 min read

Crypto Notepad

Reactions 5
1 min read

Encrypted TMUX scripts for easy SSH keysends

Reactions 15 Comments 4
1 min read

Open the Envelope: How transform encryption works with envelope encryption.

Reactions 9
2 min read

Policy-Based Client-Side Encryption in Angular

Reactions 18 Comments 3
12 min read

Storing confidential data in the cloud securely with Cryptomator

Reactions 88 Comments 3
6 min read

How does Diffie-Hellman work?

Reactions 8
1 min read

Secure communication program in a workplace. The end of the Skype era

Reactions 12
1 min read

Encrypting Files in a Post-PGP Age

Reactions 23 Comments 3
5 min read

Simple String encryption in Rails

Reactions 37 Comments 4
4 min read

Simple and secure email sending

Reactions 10
3 min read

How to setup Full Disk Encryption on a secondary HDD in Linux

Reactions 27 Comments 10
6 min read

Software security is hopelessly broken

Reactions 28 Comments 8
8 min read

How to securely store API keys

Reactions 196 Comments 27
5 min read

Using end2end encryption for ensuring mobile app security and data privacy

Reactions 19 Comments 2
2 min read

Random vs. Pseudorandom

Reactions 40 Comments 2
9 min read

What is Encryption?

Reactions 20 Comments 7
5 min read

#challenge "Using the Vigenère Cipher to Encrypt a Message with Javascript"

Reactions 12 Comments 7
5 min read
loading...