OWASP API Security Project - OWASP
Numérique Responsable
How To Set Up A Print Style Sheet — Smashing Magazine
In a time when everyone seems to have a tablet, which makes it possible to consume everything digitally, and the only real paper we use is bathroom tissue, it might seem odd to write about the long-forgotten habit of printing a Web page. Nevertheless, as odd as it might seem to visionaries and tablet manufacturers, we’re still far from the reality of a paperless world. [Links checked February/08/2017] [](https://www.smashingmagazine.com/2011/11/24/how-to-set-up-a-print-style-sheet/) In fact, tons of paper float out of printers worldwide every day, because not everyone has a tablet yet and a computer isn’t always in reach. Moreover, many of us feel that written text is just better consumed offline. Because I love to cook, sometimes I print recipes at home, or emails and screenshots at work, even though I do so as rarely as possible out of consideration for the environment.
security.txt | A proposed standard which allows websites to define security policies
A proposed standard which allows websites to define security policies.
trustedsec/physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselve...
Climate Change: Vital Signs of the Planet
Vital Signs of the Planet: Global Climate Change and Global Warming. Current news and data streams about global warming and climate change from NASA.
Accessibility For Everyone by Laura Kalbag
Who do we really benefit with accessible technology and why do any of us bother at all? This talk will explore the motivations for our work, how to overcome some of our most common failings, and where inclusive design fits in our processes, approaches, outlooks and lives.
What is planet-centric design?
I was recently asked to be on a panel about planet-centric design by New Zealand design platform, Design Assembly. The question for the panel was; Planet-centric design – What is the role and responsibility of the designer?
How to stop data centres from gobbling up the world’s electricity
The energy-efficiency drive at the information factories that serve us Facebook, Google and Bitcoin.
Naked Security
Computer Security News, Advice and Research
Ars Technica
Serving the Technologist for more than a decade. IT news, reviews, and analysis.
Threatpost | The first stop for security news
Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.
Technology News, Analysis, Comments and Product Reviews for IT Professionals
ZDNet's breaking news, analysis, and research keeps business technology professionals in touch with the latest IT trends, issues and events.
BleepingComputer
BleepingComputer.com is a premier destination for computer users of all skill levels to learn how to use and receive support for their computer.
Morning Hacked – Cybersecurity news in your inbox every weekday, in the morning!
~this week in security~
~this week in security~ Email Forms
AirPods Pro Page Performance
foobartel Ltd. is a web design consultancy based in Hong Kong.
Sobriété éditoriale : 6 grands principes
Article invité, rédigé par Ferréole Lespinasse Sobriété éditoriale, slow content, communication responsable, communication raisonnée... Après l’euphorie de la com paillette et du marketing à outrance, une certaine pondération gagne la fonction marketing-communication. Avis aux producteurs de contenus qui souhaitent
Why Performance Matters | Web Fundamentals
Thanks to mobile device and network proliferation, more people are using the web than ever before. As this user base grows, performance is more important than ever. In this article, find out why performance matters, and learn what you can do to make the web faster for everyone.
VPTCS : le modèle qualité Web (Elie Sloïm et Eric Gateau)
VPTCS : le modèle qualité Web, par Elie Sloïm et Eric Gateau Historique Le modèle VPTCS (Visibilité – Perception – Technique – Contenus – Services) est né entre 2000 et 2001 dans le cadre de travaux menés sur le site e-qualite.com. Après un premier article intitulé « Evaluation chronologique d’un site par ses utilisateurs » publié début […]
SQL Injection Tutorial for Beginners
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application’s database server.
Optimizing Encoding and Transfer Size of Text-Based Assets
Next to eliminating unnecessary resource downloads, the best thing we can do to improve page-load speed is to minimize the overall download size by optimizing and compressing the remaining resources.
Caching best practices & max-age gotchas
How to get the most out of caching without nasty race conditions
Page Weight Matters
Three years ago, while I was a web developer at YouTube, one of the senior engineers began a rant about the page weight of the video watch page being far too large. The page had ballooned to as high as 1.2MB and dozens of requests. This engineer... | Chris Zacharias | Founder of imgix. YCombinator alum. Ex-YouTuber. Studied New Media at RIT.
Performance Budgets (Keep Request Counts Low And File Sizes Small) | Tools for Web Developers
Official documentation for the "Performance Budgets" and "Keep Request Counts Low And File Sizes Small" Lighthouse audits.
Open Source Security Platform
Snyk helps you use open source and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and much more.
Fantastic Front-End Performance Tricks & Why We Do Them
The best front-end performance optimization techniques to improve browser cache perceived performance for user experience and higher conversion rates
5 astuces pour lutter contre la pollution numérique #ONPDP
Retrouvez tous les sujets des Pigeons sur https://www.france.tv/slash/on-n-est-plus-des-pigeons/1079565-comment-devenir-influenceur.html?at_medium=custom2&at_campaign=800&at_custom1=description&at_custom2=slash Vous avez des équipements numériques chez vous ? Pas très écolo ! Smartphone, ordinateur, imprimante, box internet, console de jeu, tablette…Nous sommes tous des pollueurs numérique ! Comment être geek et clean ? Les pigeons t’expliquent ! 🔔 N'oubliez pas d'activer vos notifications 🔔 Tester chaque jour la consommation et les marques, pour cela tous les moyens sont bons ! On N'est Pl...
Eliminating Known Vulnerabilities With Snyk
The way we consume **open source software (OSS) dramatically changed** over the past decade or two. Flash back to the early 2000s, we mostly used large OSS projects from a small number of providers, such as Apache, MySQL, Linux and OpenSSL. These projects came from well-known software shops that maintained good development and quality practices. It wasn’t our code, but it felt trustworthy, and it was safe to assume it didn’t hold more bugs than our own code. Fast-forward to today and OSS has turned into crowd-sourced marketplaces. Node’s npm carries over 210,000 packages from over 60,000 co...
Analyse your HTTP response headers
Quickly and easily assess the security of your HTTP response headers
The Best Request Is No Request, Revisited
Now that HTTP/2 is enjoying greater ubiquity than ever, it’s especially important to challenge the once unquestionable rule of resource bundling in client side performance. Join Stefan Baumga…