Colors

Messed Up at a Conference? You‘re Not Alone – Lessons for Speakers in Remote Conferences

This blog will walk you through some lessons for conference speakers who speak remotely no matter whether you're a first-time…

6 months ago

OWASP Mobile Top 10 Part 2: Insecure Data Storage

Insecure data storage is the second vulnerability in the OWASP Mobile Top 10 list. Insecure data storage comes straight after…

4 years ago

OWASP Mobile Top 10 Part 1: Improper Platform Usage

The improper platform usage vulnerability is the first vulnerability in the OWASP Mobile Top 10. This blog will provide some…

4 years ago

What is the OWASP Mobile Top 10?

If you ever heard of web application security, you probably heard of OWASP. And if you heard of OWASP, you…

4 years ago

The Basics of MySQL Security

If you have ever built a website, chances are you took care of security. Securing web applications does have its…

4 years ago

Build Stuff 2019 Retrospective

It's November. For some developers it's just an ordinary month - for some of them it means maintenance of projects,…

5 years ago

Cleaning a mechanical keyboard: Corsair Vengeance K70

You noticed your keyboard has dirt, some keys are stuck, some keys are not registering properly …or maybe you just…

6 years ago

WordPress Malware: WP-VCD

Using nulled WordPress themes and plugins is bad. Why? Because sometimes (well, most of the time) nulled plugins or themes…

6 years ago

Filtering user input in web applications: the basics

SQL Injection. Cross-Site Scripting. These are just two of web application security flaws that can be prevented by effectively filtering…

6 years ago