Link Details

Link 620171 thumbnail
User 352719 avatar

By cj91
Published: Jun 20 2011 / 20:17

The next entry in the Strong Cryptography series; today we’ll dive into some deeper topics. Do you know the difference between a MAC and a Hash? Why are they important for security and where could you apply these? This posts are designed to explain the topic in plain English, so come learn!
  • 24
  • 0
  • 2612
  • 15
User 294007 avatar

madth3 replied ago:

0 votes Vote down Vote up Reply

Funny how a post about security wakes up Karspersky saying it found a worm in the JS code.

User 352719 avatar

Jonathan Fisher replied ago:

0 votes Vote down Vote up Reply

lol, was it part of the title of the article or something else that set it off?

Add your comment

Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Apache Hadoop
Written by: Piotr Krewski
Featured Refcardz: Top Refcardz:
  1. Play
  2. Akka
  3. Design Patterns
  4. OO JS
  5. Cont. Delivery
  1. Play
  2. Java Performance
  3. Akka
  4. REST
  5. Java