-
Cryptopals: Set 1 – challenge 6
A return to Cryptopals means we get to break the repeating-key cipher we were working with before. Breaking crypto is fun!
-
Limiting network egress
Blocking incoming traffic is only half of a firewall’s features. Today let’s look at limiting outgoing traffic!
-
Basic firewall usage
If you run a server in the cloud, you need to use a firewall to protect it. Let’s look at the most basic settings of Ubuntu’s ufw system.
-
Overcoming imposter syndrome
Though it’s easy for me to think so sometimes, I am NOT an imposter. Neither are you.
-
Imposter syndrome
When are they going to notice? That I don’t belong here? That I’m an imposter. Oh no … I think they already know!
-
Headless WordPress
I’ve not yet been able to wrap my head around the current buzz around “headless” WordPress sites….
-
Cooking with credentials – pepper
No meal is complete without salt AND pepper. No password hashing scheme is truly secure without both, either!
-
Cooking with credentials – salting
Learn how to securely hash and anonymize user passwords in PHP using native functions that automatically apply salt.
-
Cooking with credentials – the basics
There are many ways to store user credentials for verification on the application side. Of all of them, only hashing is considered secure.
-
Communication, focus, and tone
Tomorrow is guaranteed to no one. I remain steadfast in my focus on writing, but also recognize the world is far bigger than me.






