#security
Read more stories on Hashnode
Articles with this tag
As a developer, the chances are pretty high that you have your own keys to connect to servers, and be it only the server hosting the git repository....
In my first article about PHP Hash Algorithms I explored the current status of the algorithms and how they perform in a race against each other. In...
Not too long ago I got an email from my hosting provider, actually a forwarding from the BSI (German Institute for Information Security) that stated...