This is a curated list of awesome resources for software engineers and web developers.

The goal is to have a single collection of well-organized links that can be referred to when learning or looking for something new in the vast field of computer science. This list includes both genera ...

Continue Reading
I’m a big fan of the new MacBook Pro.

It’s beautiful, fast and has great battery life. I can use it in my lap without worrying about heat or performance issues. The Touch Bar is useful but not revolutionary for me yet, although I think t ...

Continue Reading
API keys are passwords.

Treat them as such. 3. Use Strong Transport Layer Security (TLS) Protocols As noted above, all API traffic should be encrypted using the latest versions of TLS and SSL protocols to prevent eavesdrop ...

Continue Reading
If you don’t know who is accessing your APIs, it’s too late.

Data Exfiltration: Malware and/or Hacking used to exfiltrate data from the network or host for use in other attacks. Malicious insiders can easily steal sensitive data via insecurely built public-faci ...

Continue Reading
Traceable is a new startup that will help you solve your API security crisis.

We are launching with an innovative free offering, and have raised $5M in funding from top tier investors to build our team and product. We’re looking for the best people to join us on this journey ...

Continue Reading
The best way to do this is to use a program like VLC or MPlayer, which can play most video formats.

If you have the file in your Downloads folder, open up Terminal and type: mv ~/Downloads/filename.mkv https://t.co/ToEuZeL5u8 ...

Continue Reading
If you’re looking for a fun, light-hearted read with some interesting characters and a nice romance, this is the book for you.

Full Review: I'm not sure what I was expecting when I picked up this book but it wasn't quite what I got. It's definitely more of a YA story than an adult one (though there are plenty of adult them ...

Continue Reading
API keys are passwords, so treat them as such.

3. Monitor API Activity for Unauthorized Access and Abuse Even the most secure APIs can be vulnerable to unauthorized access if they aren’t monitored for suspicious activity. For example, an attacke ...

Continue Reading

Back to Main

Subscribe for the latest news: