-
Types of time
What activities do you perform that lead directly to dollars in the bank? If you doubled your focus there, would it double your income?
-
A Libsodium-based secure remote password scheme for PHP
Let’s geek out on my favorite form of authentication – not sending passwords over the wire in the first place!
-
String comparison in PHP
PHP ships with multiple, native mechanisms for comparing arbitrary string values. Let’s take a closer look at two that quantify “sameness.”
-
Self-obfuscating value objects
Sometimes, certain design patterns can aid in security as well as reusability of code. Let’s look at value objects as an example.
-
Securing tokens in PHP
Learn how password reset and other tokens can be secured by splitting the data and leveraging common password hash methodologies.
-
Paying off technical debt
Every successful development team has two things in common: They’ve shipped a product, and they accepted compromises to make that shipment possible.
-
Cryptopals: Set 1 – challenge 5
Breaking encryption is fun. Building an encryption cipher is even more so! Let’s continue our Cryptopals journey with XOR.
-
Cryptopals: Set 1 – challenge 4
Now that we know how to crack a single-byte XOR cipher, let’s expand and crack even more through Cryptopals’ next challenge.
-
Cryptopals: Set 1 – challenge 3
Next up in our Cryptopals walkthrough is some frequency analysis against simple cryptographic keys. Let’s have some fun!
-
Cryptopals: Set 1 – challenge 2
Building on our cryptopals encoding work last time, let’s introduce byte-based XOR operations.









