Link Details

Link 620171 thumbnail
User 352719 avatar

By cj91
via thecodemechanic.wordpress.com
Published: Jun 20 2011 / 20:17

The next entry in the Strong Cryptography series; today we’ll dive into some deeper topics. Do you know the difference between a MAC and a Hash? Why are they important for security and where could you apply these? This posts are designed to explain the topic in plain English, so come learn!
  • 24
  • 0
  • 2576
  • 15

Comments

Add your comment
User 294007 avatar

madth3 replied ago:

0 votes Vote down Vote up Reply

Funny how a post about security wakes up Karspersky saying it found a worm in the JS code.

User 352719 avatar

Jonathan Fisher replied ago:

0 votes Vote down Vote up Reply

lol, was it part of the title of the article or something else that set it off?

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Java Performance Optimization
Written by: Pierre-Hugues Charbonneau
Featured Refcardz: Top Refcardz:
  1. Design Patterns
  2. OO JS
  3. Cont. Delivery
  4. Java EE7
  5. HTML5 Mobile
  1. Node.js
  2. Debugging JavaScript
  3. OO JS
  4. JSON
  5. Ajax