PinnedABSOLUTELY you SHOULD WRITE your own ENCRYPTION LIBRARY!A software developers GUIDE! Why, how and just a few lines of code.Aug 1, 2022Aug 1, 2022
PinnedThe only real secure way to store your database passwords.This article will not lecture you on all the various variations of what you can do, or what you shouldn’t do even if you are already doing…Aug 19, 2021Aug 19, 2021
PinnedJWT Fingerprint tokensImproving back-end API security using left-field thinking.Apr 3, 20212Apr 3, 20212
The Dummy's Guide to ChatGPT hallucinations and prompting.If you can conceptually understand something then you can apply your own intelligence and logic to that. I hope this article will bring…Jun 7, 2023Jun 7, 2023
PARAMETER Injection HackWhy your perfectly checked input is now tainted. And how to FIX IT.Sep 18, 2022Sep 18, 2022
Most "browsers" such as Chrome or Safari will always include this however often with libraries or…I now recommend combining the following headers into a MD5 HASH which creates a unique fingerprint which does not inconvience the user:Aug 2, 2022Aug 2, 2022