Numérique Responsable

3342 bookmarks
Newest
The Cuckoo’s Egg Decompiled Course
The Cuckoo’s Egg Decompiled Course
In the 1980’s, Cliff Stoll discovered a $0.75 accounting error on the computer systems he managed at Lawrence Berkeley Laboratory. This small discovery would eventually lead him on the year-l…
·chrissanders.org·
The Cuckoo’s Egg Decompiled Course
Refusez les programmes de surveillance de données comme PRISM, XKeyscore etTempora - PRISM Break - PRISM Break
Refusez les programmes de surveillance de données comme PRISM, XKeyscore etTempora - PRISM Break - PRISM Break
Refusez les programmes de surveillance des données comme PRISM, XKeyscore et Tempora. Nous avons tous le droit à la vie privée dès maintenant en chiffrant nos communications et en mettant fin à notre dépendance à l'égard des services propriétaires.
·prism-break.org·
Refusez les programmes de surveillance de données comme PRISM, XKeyscore etTempora - PRISM Break - PRISM Break
CDN for Dummies - A Stupid Easy Guide
CDN for Dummies - A Stupid Easy Guide
This is a complete step by step CDN for dummies guide which explains everything in layman's terms. Get a CDN setup on your website in just a few minutes!
·woorkup.com·
CDN for Dummies - A Stupid Easy Guide
Free OWASP Top 10 Exercises
Free OWASP Top 10 Exercises
Kontra is an Application Security Training platform built for modern development teams.
·application.security·
Free OWASP Top 10 Exercises
10 security tips for frontend developers | Hacker Noon
10 security tips for frontend developers | Hacker Noon
Web security is a topic that is often overlooked by frontend developers. When we assess the quality of the website, we often look at metrics like performance, SEO-friendliness, and accessibility, while the website’s capacity to withstand malicious attacks often falls under the radar. And even though the sensitive user data is stored server-side and significant measures must be taken by backend developers to protect the servers, in the end, the responsibility for securing that data is shared between both backend and frontend. While sensitive data may be safely locked in a backend warehouse, the frontend holds the keys to its front door, and stealing them is often the easiest way to gain access.
·hackernoon.com·
10 security tips for frontend developers | Hacker Noon