· Alex · security
What is Another Name for Asymmetric Cryptography?
How it works, real world applications, pros and cons
How it works, real world applications, pros and cons
What is vulnerability scanning, examples and remediation strategies
Types, guidelines, and API authentication methods.
Guidelines, security measures and steps to securing file uploads
A quick run down of the most important projects OWASP has to offer in regards to securing applications
Short explainer on what is file encryption, definition, FileVault & Bitlockers