Hacking your application may be easier than you think
Or “How I hacked my favorite coffee shop, and why it matters”
Or “How I hacked my favorite coffee shop, and why it matters”
And hack your organization walking through the front door
Cross Site Request Forgery attack and mitigations explained
The basics of how to test and protect your application
And hack your organization walking through the front door
A quick introduction to one of Vim’s most powerful and underrated features
A list of options and keystrokes in Vim
Core concepts, features and building blocks
Lessons from 3-years of intensive learning
The Chinese firewall, Pitfalls to avoid and keys to success
Learn how to quick switch between AWS accounts