Numérique Responsable

2978 bookmarks
Custom sorting
The Cuckoo’s Egg Decompiled Course
The Cuckoo’s Egg Decompiled Course
In the 1980’s, Cliff Stoll discovered a $0.75 accounting error on the computer systems he managed at Lawrence Berkeley Laboratory. This small discovery would eventually lead him on the year-l…
·chrissanders.org·
The Cuckoo’s Egg Decompiled Course
Refusez les programmes de surveillance de données comme PRISM, XKeyscore etTempora - PRISM Break - PRISM Break
Refusez les programmes de surveillance de données comme PRISM, XKeyscore etTempora - PRISM Break - PRISM Break
Refusez les programmes de surveillance des données comme PRISM, XKeyscore et Tempora. Nous avons tous le droit à la vie privée dès maintenant en chiffrant nos communications et en mettant fin à notre dépendance à l'égard des services propriétaires.
·prism-break.org·
Refusez les programmes de surveillance de données comme PRISM, XKeyscore etTempora - PRISM Break - PRISM Break
CDN for Dummies - A Stupid Easy Guide
CDN for Dummies - A Stupid Easy Guide
This is a complete step by step CDN for dummies guide which explains everything in layman's terms. Get a CDN setup on your website in just a few minutes!
·woorkup.com·
CDN for Dummies - A Stupid Easy Guide
10 security tips for frontend developers | Hacker Noon
10 security tips for frontend developers | Hacker Noon
Web security is a topic that is often overlooked by frontend developers. When we assess the quality of the website, we often look at metrics like performance, SEO-friendliness, and accessibility, while the website’s capacity to withstand malicious attacks often falls under the radar. And even though the sensitive user data is stored server-side and significant measures must be taken by backend developers to protect the servers, in the end, the responsibility for securing that data is shared between both backend and frontend. While sensitive data may be safely locked in a backend warehouse, the frontend holds the keys to its front door, and stealing them is often the easiest way to gain access.
·hackernoon.com·
10 security tips for frontend developers | Hacker Noon
Website security
Website security
This article has explained the concept of web security and some of the more common threats against which your website should attempt to protect. Most importantly, you should understand that a web application cannot trust any data from the web browser. All user data should be sanitized before it is displayed, or used in SQL queries and file system calls.
·developer.mozilla.org·
Website security
Free OWASP Top 10 Exercises
Free OWASP Top 10 Exercises
Kontra is an Application Security Training platform built for modern development teams.
·application.security·
Free OWASP Top 10 Exercises
Netflix : La page de trop
Netflix : La page de trop
Le numérique est une des causes du changement climatique. Rendez-vous compte : il rejette plus de gaz à effet de serre que le secteur aérien. Une des solutions pour réduire cet impact est d'appliquer des principes de sobriété numérique. Au niveau du ...
·batby.hashnode.dev·
Netflix : La page de trop
Perflink
Perflink
JavaScript performance benchmarks you can share via URL.
·perf.link·
Perflink
What's the Difference Between PDF and Accessible PDF? | PDF Accessibility and Compliance
What's the Difference Between PDF and Accessible PDF? | PDF Accessibility and Compliance
An accessible PDF is a PDF document that can be read and accessed by people with disabilities, primarily for the vision-impaired that may use assistive technology to read the file through text-to-speech or a Braille printout. A PDF document is considered accessible only if it meets a set of accessibility guidelines.
·commonlook.com·
What's the Difference Between PDF and Accessible PDF? | PDF Accessibility and Compliance