Archive for the 'Information Security' Category

Let’s talk about your password model

This entire article is obviated by the password_hash family of functions. Please check out password_hash() and friends for information on the up-to-date and correct way to handle passwords. Generally speaking, if you are using another method, it is wrong. More specifically, if you are using another method, and it is not based on crypt(), or […]

Tuesday, February 9th, 2010

Smartphones Affected By Malware – Welcome To The Club

For years, as a P.C. and Windows user and developer, I’ve been forced to listen to inane claims about the superiority of Mac/Linux/BSD/Gameboys because they “don’t get viruses because they’re better products.”  Now, I usually try not to allow myself to be incited to anger, or shame, but come on.  That’s like saying that Malta […]

Friday, July 31st, 2009