Tweetovi

Blokirali ste korisnika/cu @neilmaddog

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @neilmaddog

  1. Prikvačeni tweet
    13. lip 2019.
    Poništi
  2. prije 8 sati
    Poništi
  3. proslijedio/la je Tweet
    3. velj
    Odgovor korisniku/ci
    Poništi
  4. 3. velj

    It's over half a year since the Kubernetes security audit and the docs *still* recommend aes-cbc encryption. WTF?

    Poništi
  5. proslijedio/la je Tweet
    3. velj

    Trying to figure out how many times I can write this in a slide deck before it becomes overkill: "Do not wrap story boilerplate around things which aren’t user stories. A story needs to be verifiable by a person ... and have value to that person."

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    31. sij

    It's taken a while, as he decided to make it compatible with 64-bit systems before releasing it, but, as I hinted at Code Mesh, David Turner has now released the Miranda programming language under a BSD licence:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    31. sij
    Poništi
  8. 30. sij

    Reading about nonce reuse attacks vs fault attacks and so on, I feel like there’s some principle along the lines of preferring deterministic algorithms with randomized messages, eg AES-SIV with random IV in AAD, EdDSA with some fresh random in every message (eg “jti” in JWT)

    Poništi
  9. 29. sij

    Still looking, but these courses from Josh Cummings seem very good from an initial review.

    Poništi
  10. 29. sij

    I’ve been asked to recommend secure development courses on Pluralsight. Anyone have any recommendations? (I had a quick look at some highly rated crypto ones and that’s a lot of bad 90s crypto advice to take in... 😬)

    Poništi
  11. proslijedio/la je Tweet
    28. sij

    Our Technical Director Dr Ian Levy explains how the security analysis behind the DCMS supply chain review will ensure the UK’s telecoms networks are secure – regardless of the vendors used

    Poništi
  12. proslijedio/la je Tweet
    Odgovor korisniku/ci
    Poništi
  13. proslijedio/la je Tweet
    28. sij
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    25. sij

    11. Self-signed certificates beget long lived certs, which beget lack of certificate validity monitoring, which begets curl -k, which begets a lack of certificate deployment automation, which begets self-signed certificates.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    25. sij

    Yarn 2 lets you write constraints for your dependencies in Prolog. Prolog. In real life. "Introducing Yarn 2 ! 🧶🌟" by

    Poništi
  16. proslijedio/la je Tweet
    25. sij
    Prikaži ovu nit
    Poništi
  17. 24. sij

    Some really great resources in this thread.

    Poništi
  18. 24. sij

    Imagine being revived from your peaceful cryoslumber just to be mocked for the crap code you wrote last millennium.

    Poništi
  19. proslijedio/la je Tweet
    23. sij

    10 days left to get your code into the Arctic Code Vault! On 02/02/2020, we will make a copy of every active public repository on GitHub to preserve them in a decommissioned coal mine for over 1,000 years.

    Poništi
  20. 23. sij

    Advice for ForgeRock customers on the upcoming SameSite cookie changes in Google Chrome 80.

    Poništi
  21. proslijedio/la je Tweet
    21. sij

    Terrible news coming out of University. , , and are all going to be closed down. These programmes produced many fantastic graduates over the years, many of whom went on to become teachers, academics, or politicians.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·