since 1999

Using IPTABLES to Require CloudFlare for All HTTP/HTTPS Traffic

Really Bad Passwords (with Unsalted Hashes)

Building Secure Web Applications (Info Graphic)

What is Protected Personally Identifiable Information? Do I really have to hash users' passwords?

Generate OpenSSL RSA Key Pair from the Command Line

In 42 seconds, learn how to generate 2048 bit RSA key. And then what you need to do to protect it.

Wikipedia *blackout* tomorrow in protest to SOPA/PIPA

OpenSSL: Encrypt a File with a Password from the Command Line

Conditionally Including Resources on SSL or non-SSL to Avoid Mixed Content Security Warnings in Ruby on Rails

When building content that can be delivered on an encrypted HTTPS connection it is necessary to reference all of the embedded resources, 3rd party badge images, embedded YouTube videos, etc, from an HTTPS url. Otherwise a mixed content error will imply to your users that the website is not safe, ouch!

Authentication Without Encryption for Ham Radio

Crypto can be used for secure authentication without obscuring the meaning of communications - by KI4AWF.

Tired of Contact Form Spam?