Bitcoin is based on the UTXO (unspent transaction output) model to ensure that nobody is able to...
Passwords are the keys to the locks that secure our accounts: Your email, bank and investment...
Cross-Site Request Forgery (short: CSRF or XSRF) is an attack that makes the victim's browser...
Encryption is about keeping a secret and being able to restore it. Hashing is about fingerprinting...
Serialization is the act of transforming objects from an internal representation to a stream of...
HTTPS, SSL, and TLS are all related to encrypted (“secure”) internet connections. The problem they...
Bitcoin crossed $40,000 USD for the first time recently, so it’s again in the news. Bitcoin is just...
I love those simple cookies. They are not super dry like many others, they are easy to cook. Let's...
Python keeps developing via Python Enhancement Proposals (PEPs). PEP 586 added a feature I love:...
The terms “decentralized” and “distributed” sound extremely similar and people sometimes use them...
Vendoring in Software Engineering is the act of including 3rd party software directly in your...
It’s new years eve and — as always — I try to finish some things and have some plans for next...
A data scientists yearly review Many banks allow you to get a CSV dump of your transactions. I’ve...
Having an attacker with physical access to your device is one of the worst scenarios. If the data...
How it works The following XML defines an entity ha , then an entity ha2 which contains ha twice....
Christmas is about family — here is how you make the best out of the current situation My family...
Assuming that you cannot control the input directly and prevent XMLs with attacks from reaching you...
The Cyber Security Triad, also called the CIA triad, is a set of three goals: Confidentiality:...
XML is probably the most commonly used markup language. It’s organized around tags...
The job as a software developer is pretty crazy: You need to learn constantly about new...