Courses
Pricing
Leaderboard
Community
Lore
Youtube
Podcast
Blog
Sign In
Sign In Courses Pricing Leaderboard Community Lore Youtube Podcast About Blog

Security

  • They Who Control Encryption

    Aug 12, 2020 by Lane Wagner

    If you’ve seen The Imitation Game or studied computer science in school, you have likely heard of Enigma, Alan Turing, or some of the other advances in cryptography that took place during the Second World War.

  • How Do Brute-Force Attackers Know They Found The Key?

    Feb 11, 2020 by Lane Wagner

    To “Brute Force” something (when talking about computers) means to systematically try every possible combination until you find the right answer.

  • Security in Dependencies

    Aug 21, 2019 by Lane Wagner

    Choosing the right dependencies is a difficult task. Assuming the developer of an application is the best programmer in the world, the “best” thing to do would be to write the entire codebase alone.

  • Creating and Remembering a Strong Passphrase

    Aug 03, 2019 by Lane Wagner

    We all have hundreds of online accounts. Ideally, as many of those accounts as possible have unique passwords.

  • Trustworthy vs Trustless Apps

    Jul 23, 2019 by Lane Wagner

    In the wake of the hearings about Facebook’s new Libra blockchain, it is more important than ever that we all understand the difference between trustworthy and trustless apps.

Categories - Contact - Playground - About
boot.dev
Sitemap RSS FAQ TOS Privacy
© Boot.dev 2024