All bookmarks836 Frameworks 150 Cross Device 88 Performance 74 Typography 58 Programming 51 Widgets 42 Workflow 42 Visualization 35 Animation 26 Architecture 22 Template Engines 19 Testing 18 Modularity 14 Windows 8 Style 13 Presentations 11 Security 11 Rich Text Editors 11 Validation 10 Routing And URLs 10 Documentation 10 Code Viewers 9 Video 9 Tables 8 Guides 8 Jobs 7 Misc 6 Cross Browser 5 Prototyping 5 Scrolling 5 Keyboard 5 Package Management 5 Library Collections 5 Other Front End Collections 5 Transitions 4 Image Manipulation 4 WebSocket 4 Patterns 3 Layout 3 Numbers 3 Time and Dates 3 HTTP 3 Error Handling 3 Chat 2 JSON 2 DOM Manipulation 2 Search 2 Refactoring 1
oAuth Consumer Library
by John Kristian
How iD Logs in to OpenStreetMap
Handbook of Applied Cryptography
Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It
The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it appear destined for success. In the days prior to Thanksgiving 2013, someone installed malware in Target’s (TGT) security and payments system designed to steal every credit card used at the company’s 1,797 U.S.
Advice from a Real Hacker: How to Create Stronger Passwords
People who know that I am a professional hacker often ask me what they can do to make their computers and personal information safe from people like me.
The Secret Life of Passwords
Howard Lutnick, the chief executive of Cantor Fitzgerald, one of the world’s largest financial-services firms, still cries when he talks about it.
The Internet’s Telltale Heartbleed
The cryptography expert Bruce Schneier, who has been writing about computer security for more than fifteen years, is not given to panic or hyperbole.
Intrusion Detection Systems with Snort
How Russian Hackers Stole the Nasdaq
In October 2010, a Federal Bureau of Investigation system monitoring U.S. Internet traffic picked up an alert. The signal was coming from Nasdaq (NDAQ). It looked like malware had snuck into the company’s central servers.
Everything Is Broken
Once upon a time, a friend of mine accidentally took over thousands of computers. He had found a vulnerability in a piece of software and started playing with it. In the process, he figured out how to get total administration access over a network.
OWASP Top 10 for .NET Developers
Inside The Billion-Dollar Hacker Club
For this group of old friends, assembled for an impromptu reunion, the venue would feel familiar: an online chat room running on a secure private server.
Secrets, lies and Snowden's email: why I was forced to shut down Lavabit
My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation of surveillance equipment on my company's network.
The Ultra-Simple App That Lets Anyone Encrypt Anything
Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn’t figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video.
The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus
Boldizsár Bencsáth took a bite from his sandwich and stared at his computer screen.