Bookmarks with tag "security", page 3 of 4
Recovers passwords from pixelized screenshots.
An open-source and end-to-end encrypted SDK and backend.
A TCP reset attack is executed using a single packet of data, no more than a few bytes in size. A spoofed TCP segment, crafted and sent by an attacker, tricks two victims into abandoning a TCP connection, interrupting possibly vital communications between them.
Learn how to make sure that your users' passwords are safe and secure in your PostgreSQL database.
Local ad blocker. Like Pi-hole but local and using your operating system.
Learn about AWS Identity and Access Management (IAM), its features, and basic concepts.
Switch up your browser and search engine, add some plugins to block surveillance, and get a little technical with DNS servers.
Canvas fingerprinting is a tracking method that uses HTML5 Canvas code to generate a unique identifier for each individual user. The method is based on the fact that the unique pixels generated through Canvas code can vary depending on the system and browser used, making it possible to identify users.
A simple, accessible recommendation for key sizes and recommended algorithms for various cryptographic algorithms.
Quick automated code review of your changes.
Learn about refresh tokens and the role they serve in the authorization process