security


post-738-thumbnail
Shamir's Secret Sharing Scheme In Javascript

Passwords are kryptonite to security so they need to be strong and never reused. Developers agree wit...

post-705-thumbnail
Cloud-Based Crm System: Is It Safe And What Are The Benefits?

Thanks to the massive expansion of internet infrastructure in recent decades, cloud computing solutio...

2fanotifier And Multi-Factor Authentication

Tanya introduces 2FAnotifier, a free a browser plugin that when you multi-factor authentication is offered on a site. #MFAally

This Is Why I Use Keycloak?

Hello everyone ! Today i’m going to explain to you how you can save time when securing your web...

post-502-thumbnail
Zero-Knowlege Authentication With Javascript

Passwords are kryptonite to security and they should never leave the client application or web browse...

post-484-thumbnail
Enabling Tls Just Got A Little Bit Easier

We all know that enabling HTTPS is one of the ten commandments of web development, but it's always a...

Two-Factor Authentication

A quick look at Two Factor Authentication and how to get started

How To Keep Your Code Secure

Understand why you should integrate security from the ground up of any new feature or development you are doing within your company.

Jackson Deserialization Vulnerability

On July 29th, 2019 a high severity Deserialization of Untrusted Data vulnerability (CVE-2019-14379, C...

5 Reasons To Start Using Ubuntu

5 reasons to start using Ubuntu Most people know Ubuntu as a server operating system...

post-237-thumbnail
You Have Critical Security Vulnerabilities In Your Software But You Don’T Know It Yet!

Let’s start with some figures 12: 44% of applications contain critical vulnerabilities in open sour...

post-93-thumbnail
Learn And Build Web Authentication System (Universal Principles)

What's an Authentication? Servers are basically stupid computer programs who cannot rememb...

Robots Protect Better Than You

Why your business is safer in the hands of technology.