Messed Up at a Conference? You‘re Not Alone – Lessons for Speakers in Remote ConferencesMessed Up at a Conference? You‘re Not Alone – Lessons for Speakers in Remote Conferences

Messed Up at a Conference? You‘re Not Alone – Lessons for Speakers in Remote Conferences

7 months ago
Colors

This blog will walk you through some lessons for conference speakers who speak remotely no matter whether you're a first-time…

OWASP Mobile Top 10 Part 2: Insecure Data StorageOWASP Mobile Top 10 Part 2: Insecure Data Storage

OWASP Mobile Top 10 Part 2: Insecure Data Storage

4 years ago

Insecure data storage is the second vulnerability in the OWASP Mobile Top 10 list. Insecure data storage comes straight after…

OWASP Mobile Top 10 Part 1: Improper Platform UsageOWASP Mobile Top 10 Part 1: Improper Platform Usage

OWASP Mobile Top 10 Part 1: Improper Platform Usage

4 years ago

The improper platform usage vulnerability is the first vulnerability in the OWASP Mobile Top 10. This blog will provide some…

What is the OWASP Mobile Top 10?What is the OWASP Mobile Top 10?

What is the OWASP Mobile Top 10?

4 years ago

If you ever heard of web application security, you probably heard of OWASP. And if you heard of OWASP, you…

The Basics of MySQL SecurityThe Basics of MySQL Security

The Basics of MySQL Security

4 years ago

If you have ever built a website, chances are you took care of security. Securing web applications does have its…

Build Stuff 2019 Retrospective

5 years ago

It's November. For some developers it's just an ordinary month - for some of them it means maintenance of projects,…

Cleaning a mechanical keyboard: Corsair Vengeance K70

6 years ago

You noticed your keyboard has dirt, some keys are stuck, some keys are not registering properly …or maybe you just…

WordPress Malware: WP-VCD

6 years ago

Using nulled WordPress themes and plugins is bad. Why? Because sometimes (well, most of the time) nulled plugins or themes…

Filtering user input in web applications: the basics

6 years ago

SQL Injection. Cross-Site Scripting. These are just two of web application security flaws that can be prevented by effectively filtering…

Build Stuff 2018 Retrospective

6 years ago

I do not usually write retrospectives on conferences I have attended, but this was something else altogether. What was it?…