stbuehler.de
stbuehler.de - Stefan's Blog
http://stbuehler.de/blog
Type punning with unions. Don’t use unions for type punning; always use. Sometimes you might want to reinterpret a value of one type as value of another type. For example you might have an integer parameter, but you know that it actually contains a float value. Let’s assume the integer was large enough to store the float somehow, and now you want to get the value back. If you follow wikipedia. You might do something like this:. But if you start using pointers (or references in C ) this can fail very fast:.
keybase.io
TripleSec - Symmetric Encryption in the Browser combining AES, Salsa20, and Twofish
https://keybase.io/triplesec
TripleSec: now in Python, JS, Node.js, Go, and C#. Is a simple, triple-paranoid, symmetric encryption library. For Python, Node.js, Go, C#, and the browser. It encrypts data with Salsa 20. So that a compromise of one or two of the ciphers will not expose the secret. Of course, encryption is only part of the story. TripleSec also: derives keys with scrypt. To defend against password-cracking and rainbow tables; authenticates with HMAC. Encryption is performed by the. What, i, total}). What, i, total}).
old.blog.phusion.nl
Ruby Archives - Phusion Blog
http://old.blog.phusion.nl/category/ruby
Traveling Ruby 20150210: smaller, supports Ruby 2.2, Windows. By Hongli Lai on. February 9th, 2015. Allows you to create self-contained, “portable” Ruby binaries which can run on any Windows machine, any Linux distribution and any OS X machine. This allows Ruby app developers to distribute a single package to end users, without needing end users to first install Ruby or gems. There’s a little bit of a backstory behind this release. Last week I went to Amsterdam.rb’s MRI Implementors Panel. Although some ...
en.wikipedia.org
Hash-based message authentication code - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Hash-based_message_authentication_code
Hash-based message authentication code. From Wikipedia, the free encyclopedia. A keyed-hash message authentication code. Is a specific type of message authentication code. MAC) involving a cryptographic hash function. Hence the 'H') in combination with a secret cryptographic key. As with any MAC, it may be used to simultaneously verify both the data integrity. Any cryptographic hash function, such as MD5. Of the underlying hash function, the size of its hash output, and on the size and quality of the key.
sponge.noekeon.org
The Sponge Functions Corner
http://sponge.noekeon.org/news_feed_avail.html
The Sponge Functions Corner. And Gilles Van Assche. Instances of sponge functions. Sponge construction [ PDF. Duplex construction [ PDF. The figures above are available under the Creative Commons Attribution license. In short, they can be freely used, provided that attribution is properly done in the figure caption, either by linking to this web page or by citing the article where the particular figure first appeared. Renewed web page and news feed available. This first news item opens the news feed.
sponge.noekeon.org
The Sponge Functions Corner
http://sponge.noekeon.org/index.html
The Sponge Functions Corner. And Gilles Van Assche. Renewed web page and news feed available. Instances of sponge functions. Sponge construction [ PDF. Duplex construction [ PDF. The figures above are available under the Creative Commons Attribution license. In short, they can be freely used, provided that attribution is properly done in the figure caption, either by linking to this web page or by citing the article where the particular figure first appeared. Complete text in PDF format. Our original mot...
sponge.noekeon.org
The Sponge Functions Corner
http://sponge.noekeon.org/news.html
The Sponge Functions Corner. And Gilles Van Assche. Instances of sponge functions. Sponge construction [ PDF. Duplex construction [ PDF. The figures above are available under the Creative Commons Attribution license. In short, they can be freely used, provided that attribution is properly done in the figure caption, either by linking to this web page or by citing the article where the particular figure first appeared. Renewed web page and news feed available. This first news item opens the news feed.
db-consult-aalderks.de
Tipps & Tricks - Database Consult Aalderks
http://www.db-consult-aalderks.de/12.html
Vorhersagen sind schwierig, besonders wenn sie die Zukunft betreffen. - Niels Bohr, Physiker. Tipps and Tricks sowie Artikel zum Thema Database Security. Unified Auditing Oracle 12c in Practice Teil 4 (new 14.06.2016 ). Unified Auditing Oracle 12c in Practice Teil 3 ( 09.03.2016 ). Unified Auditing Oracle 12c Teil 2 (update 10.01.2016 ). Unified Auditing Oracle 12c Teil 1 (update 26.11.2015 ). Mutmaßlich flächendeckende Wirtschaftsspionage in Deutschland. Warum kaum in Database Security investiert wird.
SOCIAL ENGAGEMENT