並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 9 件 / 9件

新着順 人気順

https passwords google com options encryptionの検索結果1 - 9 件 / 9件

  • How I Hacked my Car

    Note: As of 2022/10/25 the information in this series is slightly outdated. See Part 5 for more up to date information. The Car⌗ Last summer I bought a 2021 Hyundai Ioniq SEL. It is a nice fuel-efficient hybrid with a decent amount of features like wireless Android Auto/Apple CarPlay, wireless phone charging, heated seats, & a sunroof. One thing I particularly liked about this vehicle was the In-V

    • The SaaS CTO Security Checklist Redux - Gold Fig — Peace of mind for infrastructure teams

      Doing the basics goes a long way in keeping your company and product secure. This third1 edition of the SaaS CTO Security Checklist provides actionable security best practices CTOs (or anyone for that matter) can use to harden their security. This list is far from exhaustive, incomplete by nature since the security you need depends on your company, product, and assets. 🚀 Your employees Accustom e

        The SaaS CTO Security Checklist Redux - Gold Fig — Peace of mind for infrastructure teams
      • 6 Reasons You Shouldn't Use Your Web Browser's Password Manager

        Password managers have become so essential that web browsers offer built-in solutions. While browser-based password managers are free, third-party standalone solutions are also available. But it would help if you didn’t use your browser’s built-in password manager. And here's why. Which Browsers Have Built-in Password Managers? Mainstream browsers offer password management features. No surprises h

          6 Reasons You Shouldn't Use Your Web Browser's Password Manager
        • 7 Essential Tips to Secure Google Drive

          If you store files in Google Drive, it’s important to make sure they’re safe. Thankfully, there are many ways to keep your files in Google Drive private and secure from prying eyes. Let’s look at practical ways to increase the security of your Google Drive account and prevent unauthorized access to your files. 1. Secure Your Google Account Since Google Drive is under your wider Google account (alo

            7 Essential Tips to Secure Google Drive
          • Password Managers.

            Introduction I’ve spent a lot of time trying to understand the attack surface of popular password managers. I think I’ve spent more time analyzing them than practically anybody else, and I think that qualifies me to have an opinion! First, let’s get a few things out of the way. For some reason, few subjects can get heated faster than passwords. Maybe politics and religion, but that’s about it. It’

            • What happens when you type a URL into your browser? | Amazon Web Services

              Front-End Web & Mobile What happens when you type a URL into your browser? This article was written by Jenna Pederson. Every day you open up your browser and navigate to your favorite websites — whether it be social media, news, or e-commerce sites. You go to this page by typing in a url or clicking on a link to the page. Have you ever thought about what happens behind the scenes? How does the new

                What happens when you type a URL into your browser? | Amazon Web Services
              • OAuth 2.0 Simplified | What is Oauth and How Does it Work | FusionAuth | FusionAuth Docs

                OAuth 2.0 Simplified | What is Oauth and How Does it Work | FusionAuthBy Brian Pontarelli, Ahmed Hashesh and Dan Moore I know what you are thinking, is this really another guide to OAuth 2.0? Well, yes and no. This guide is different from most of the others out there because it covers all of the ways that we actually use OAuth. It also covers all of the details you need to be an OAuth expert witho

                  OAuth 2.0 Simplified | What is Oauth and How Does it Work | FusionAuth | FusionAuth Docs
                • Authentication Protocols and Building Authentication Sessions with Golang

                  The Authentication Session of a web app is the heart of its defense against malicious threats. Hence, it is among the first points of recon for a security tester. This article will discuss the authentication sessions of a web app in the “Go” programming language (Golang). It will also discuss the vulnerabilities and design flaws in authentication sessions, the difference between Session-Based and

                    Authentication Protocols and Building Authentication Sessions with Golang
                  • Manjusaka: A Chinese sibling of Sliver and Cobalt Strike

                    Cisco Talos recently discovered a new attack framework called "Manjusaka" being used in the wild that has the potential to become prevalent across the threat landscape. This framework is advertised as an imitation of the Cobalt Strike framework.The implants for the new malware family are written in the Rust language for Windows and Linux.A fully functional version of the command and control (C2),

                      Manjusaka: A Chinese sibling of Sliver and Cobalt Strike
                    1