The advantage of this approach is that it allows me to check if two pieces of data are identical or not without actually having to store them both. This means that I can avoid storing duplicate copies ...
Continue ReadingJuly 29, 2021
The API economy is growing at an unprecedented pace, and organizations are increasingly relying on APIs to drive innovation https://t.co/Eg46lu5tzq ...
Continue ReadingJuly 29, 2021
The following example shows how an attacker could use a stolen users ID and password to access their bank account: A malicious user steals a valid users credentials from a compromised website, ...
Continue ReadingJuly 29, 2021
Treat them accordingly. 3. Require Transport Layer Security for All API Traffic While the use of HTTPS is a good first step, its not enough to protect all API traffic from eavesdropping and man-in ...
Continue ReadingJuly 29, 2021
I've been working on the Go team since before 1.0 shipped in March 2012. In that time we've released many new versions of the language, libraries, and tools; grown from a few dozen to hundreds of cont ...
Continue ReadingJuly 29, 2021
It's easy and quick, but it doesn't give you much control over your environment. If you want more control, build from source or use a pre-built binary for your platform of choice (Linux/OSX only). If ...
Continue ReadingJuly 29, 2021
Youre human, and its natural to have them. The second most important thing is that your feelings of guilt or shame about those thoughts dont help anyone least of all the people who love you h ...
Continue ReadingJuly 29, 2021
0 is still the most popular authorization protocol, but it has a number of limitations that are being addressed by OAuth 3.0 and OpenID Connect (OIDC). The main problem with OAuth 2.0 is that it does ...
Continue ReadingJuly 29, 2021
Back to Main