Eric Mann's Blog

  • Writing
  • Weighted random choice in PHP
    January 11, 2022

    Weighted random choice in PHP

    PHP’s native random_int() function can be used to easily create a weighted random choice between multiple, otherwise equal options.

    Technology
  • Verifying randomness in PHP [Part 2]
    January 10, 2022

    Verifying randomness in PHP [Part 2]

    How random is random_bytes() in PHP? Are you sure?

    Security, Technology
  • Verifying randomness in PHP [Part 1]
    January 9, 2022

    Verifying randomness in PHP [Part 1]

    How random is PHP’s random_int() function really?

    Security, Technology
  • Hashing is not encryption
    January 8, 2022

    Hashing is not encryption

    Encryption, encoding, and hashing are three related but distinct concepts. It’s important for you to understand all three.

    Technology
  • Lock picking can make you a better engineer
    January 7, 2022

    Lock picking can make you a better engineer

    Learning to use a lock pick changes the way you see security and the way you think about code. It’s a great mental challenge and will help you build stronger, more secure systems.

    Security
  • Using a 3D printer for practical home repair
    January 6, 2022

    Using a 3D printer for practical home repair

    I taught myself 3D modeling so I could print and cast a bracket for my son’s bed out of epoxy. It was a hugely rewarding journey!

    Technology
  • Demystifying forms of encryption
    January 5, 2022

    Demystifying forms of encryption

    There are three types of encryption every developer should know: symmetric, asymmetric, and envelope (which is a combination of the previous two).

    Technology
  • Prioritizing time for creativity
    January 4, 2022

    Prioritizing time for creativity

    If you want to be more creative, you need to intentionally prioritize time to practice creativity.

    Writing
  • End-to-end encrypted secret sharing
    January 3, 2022

    End-to-end encrypted secret sharing

    Secret sharing typically requires a trusted third party to communicate a secret from point A to B. Encrypting those secrets at point A and only allowing point B to decrypt them removes any risk in the transfer.

    Technology
  • A new tech stack for WordPress
    January 2, 2022

    A new tech stack for WordPress

    A solid blog starts with a solid foundation – in this case WordPress and the tech stack that powers it.

    Technology, Writing
Previous Page Next Page

© 2026

Eric Mann's Blog

·

Powder Theme by Brian Gardner

  • X
  • LinkedIn
  • Mastodon