Toggle navigation
TWunroll
TWunroll
faq
Contact US
#Password
Mr. Yamraj 😈😈 - Proud SSRian
YamHaiiiHum
SSRiansWe are all fighting together for justice and I don't feel any need of sharing personal details i.e name, hometown, phone number with anyone. We can continue to be active
Read more
## cee 📌 killugon edit !
gohjous
QUESTION THREAD FOR KLEE-HAVERS what ar were you at when you pulled her? what artifacts do you use for her? what server are you on? what’s your username? what’s
Read more
Thomas H. Ptacek
tqbf
This paper is very cool: behavior oracles in interactive systems that reveal successful decryption can, with a bunch of different AEADs incl. GCM and Chapoly, discern which specific key was
Read more
GeePaw Hill
GeePawHill
How do we iterate user value? How can we follow the "more smaller steps" approach and still deliver a positive experience for the user? Today let's look at some ways
Read more
Jeremy
_Jeremee_
In case you're unable to download apps from the iOS app store, please follow these steps;Open Phone SettingsSearch VPNTap "Add VPN Configuration"Change Type to "L2TP"Description: Use any name or word
Read more
Santiago
svpino
How serious you are about your Web Development skills?Here are 10 side projects that you can tackle in your free time and will take your skills to another dimension.They aren't
Read more
Venkatesh Rao
vgr
Does anybody feel like they’re actually good at maintenance? As in, healthy attitude, motivation, good dopamine loops around stuff like paperwork, chores, boring repairs where you learn nothing new, doctor
Read more
Pieter Gunst
DigitalLawyer
Oooof. Was just subjected to the most credible phishing attempt I've experienced to date. Here were the steps:1) "Hi, this is your bank. There was an attempt to use your
Read more
Steve Syfuhs
SteveSyfuhs
A couple weeks ago I created a thread about logging into Windows. Have you ever wondered how that works for things like Remote Desktop?https://twitter.com/SteveSyfuhs/status/1297957799079510018 The first thing the client does
Read more
Devon Price
drdevonprice
I gotta say it. Multi-factor authentication is super inaccessible if you have disabilities that make it hard to switch between a bunch of applications and fill out forms, like Autism
Read more
Justin Cormack
justincormack
This is a fine article about DevSecOps maturity https://r2c.dev/blog/2021/four-levels-of-maturity-that-bridge-the-app-sec-engineering-divide/ but the example does bother me, how should you stop sensitive data leaking into logs, systematical
Read more
Steve Syfuhs
SteveSyfuhs
Have you ever wondered how Windows does Single Sign-on? It's been a while since I did one of these threads, so lets look at some history. For SSO in Windows
Read more
Movie Mango ®
Go_Movie_Mango
Digital Security 101 : A thread0) keep your all devices locked 1) keep changing your password every one month 2) be aware of CCTV cams and people behind you while
Read more
AaronGenest
AaronGenest
Okay. I'm going to do a usability audit for free for @saskhealth eHealth.Let's start with the front page 1) We have two methods of getting to your health record, through
Read more
Rob MacKay
RobJMacKay
Ok, fuck it. One like = one poorly illustrated reason Batman might say “fuck” in the new Snyder film. He burns his fried egg. His pen runs out at the
Read more
ριɳɠυιɳσ
pinguino
Well this week was sure a kick in the pants to organize my crypto. Here’s what I’ve learned: My strategy to not put it in one spot was actually good,
Read more
‹
1
2
...
4
5
6
7
8
9
10
...
22
23
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree