Eric Mann's Blog

  • Writing
  • Types of time
    February 25, 2022

    Types of time

    What activities do you perform that lead directly to dollars in the bank? If you doubled your focus there, would it double your income?

    Business
  • A Libsodium-based secure remote password scheme for PHP
    February 24, 2022

    A Libsodium-based secure remote password scheme for PHP

    Let’s geek out on my favorite form of authentication – not sending passwords over the wire in the first place!

    Security, Technology
  • String comparison in PHP
    February 23, 2022

    String comparison in PHP

    PHP ships with multiple, native mechanisms for comparing arbitrary string values. Let’s take a closer look at two that quantify “sameness.”

    Technology
  • Self-obfuscating value objects
    February 22, 2022

    Self-obfuscating value objects

    Sometimes, certain design patterns can aid in security as well as reusability of code. Let’s look at value objects as an example.

    Security, Technology
  • Securing tokens in PHP
    February 21, 2022

    Securing tokens in PHP

    Learn how password reset and other tokens can be secured by splitting the data and leveraging common password hash methodologies.

    Security, Technology
  • Paying off technical debt
    February 20, 2022

    Paying off technical debt

    Every successful development team has two things in common: They’ve shipped a product, and they accepted compromises to make that shipment possible.

    Technology
  • Cryptopals: Set 1 – challenge 5
    February 19, 2022

    Cryptopals: Set 1 – challenge 5

    Breaking encryption is fun. Building an encryption cipher is even more so! Let’s continue our Cryptopals journey with XOR.

    Security, Technology
  • Cryptopals: Set 1 – challenge 4
    February 18, 2022

    Cryptopals: Set 1 – challenge 4

    Now that we know how to crack a single-byte XOR cipher, let’s expand and crack even more through Cryptopals’ next challenge.

    Security, Technology
  • Cryptopals: Set 1 – challenge 3
    February 17, 2022

    Cryptopals: Set 1 – challenge 3

    Next up in our Cryptopals walkthrough is some frequency analysis against simple cryptographic keys. Let’s have some fun!

    Security, Technology
  • Cryptopals: Set 1 – challenge 2
    February 16, 2022

    Cryptopals: Set 1 – challenge 2

    Building on our cryptopals encoding work last time, let’s introduce byte-based XOR operations.

    Security, Technology
Previous Page Next Page

© 2026

Eric Mann's Blog

·

Powder Theme by Brian Gardner

  • X
  • LinkedIn
  • Mastodon