Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceWell Done To WhatsApp — In Taking Security Seriously: Key TransparencyIn the UK, we could be progressing towards an unhappy band of countries who restrict end-to-end encryption. So just as the UK is moving…Apr 13, 20234Apr 13, 20234
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAt The Core of Cybersecurity Is “The Secret”: And The Great Protector is PBKDF2At the core of cybersecurity is the secret. What does that mean? Well, somewhere on your system, there are core secrets that protect you…Mar 21, 20231Mar 21, 20231
Ethan RobertsDON’T sell your old laptops!Are you looking for a new tech project? Having an old laptop can fulfill your needs…May 29, 202257May 29, 202257
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceCTF Generator: RSA Cracking With the Different Public Exponents But The Same ModulusI love cracking ciphers, and I believe it is great exercise for your brain. And, so, I see so many of our students undertaking CTF (Capture…Aug 26, 2022Aug 26, 2022
Juan EspañainByteHideC# 11 is on the way! Microsoft Releases +5 New FeaturesJust a couple of days ago Microsoft announced and revealed the new features of .NET 7. All very focused on pure performance (up to 73.5%…May 10, 2022May 10, 2022
Juan EspañainByteHideNew OFFICIAL .NET 7 Features Released (Now FASTER and LIGHTER⚡)The latest official Microsoft benchmark shows 73.5% faster performance and up to 50% lighterApr 25, 2022Apr 25, 2022
Marc IlgeninCoinmonksHow Your Metamask Got Hacked (Probably)I readily admit I love DeFi crypto investing — finding new yield-generating projected and identifying the legitimate projects from the…Mar 17, 202228Mar 17, 202228
Amir Ali Hashemi5 Money-Making Telegram Bot IdeasTelegram bots are incredibly popular, and it’s easier to get started than ever before. With libraries for every major programming language…Mar 2, 202212Mar 2, 202212
Hacken.AIJoin Hacken Cyber Army — Let’s Fight Against Russian Propaganda Together!The global democratic community is experiencing one of the most difficult periods in its modern history. Hackers worldwide are uniting…Feb 28, 2022Feb 28, 2022
Orkhan HuseynliSoftware Architecture Patterns: 5 min readMain software architecture patterns in a nutshell.Sep 4, 202124Sep 4, 202124
Miroslaw ShpakYou don’t need JWT anymoreA simpler way to authenticate users with web3 using signed messagesOct 2, 202188Oct 2, 202188
AniketinJavaScript in Plain EnglishI Met a Rich Programmer, He Gave Me 3 Life-Changing Pieces of Advice#2 Never quit your JobJan 27, 202278Jan 27, 202278
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThere Is Beauty in Cybersecurity: Bare Bones RSA in RustI really love creating code in Rust, but while there are lots of libraries around to integrate, there’s a real lack of practical examples…Dec 5, 2021Dec 5, 2021
ABN AMROinABN AMRO Developer BlogAzure DevOps Pipeline Tutorial — Part 1: CI pipeline fundamentalsBy Penny Xuran QianOct 12, 20214Oct 12, 20214
ChristianlauerinGeek CultureFinding Abandoned Places with SQLHow to use Data Science to find Lost PlacesNov 4, 20211Nov 4, 20211
Serafeim Loukas, PhDHow to use Python & SQL to manipulate data in 1 minJust read on!Oct 7, 2021Oct 7, 2021