Blog Tag: Security

Thoughts, insights all hot off the virtual press.

Blog | 27 May 2021

15 good reasons to redesign your website

Worried your site might need a refresh? Here are 15 signs you might need a new website – and what to do about them.
Person lying face down on a desk
Full Story
Blog | 03 June 2020

How to improve your WordPress security

We implement a range of measures to enhance security and protect against targeted attacks.
Image representing digital security - a lock superimposed on a motherboard
Full Story
Blog | 04 September 2019

Non-cryptographic hashing functions: The Infinity Stones of Computer Science – Part 3

In this last instalment of the three-part article exploring non-cryptographic hashing we reveal two more amazing applications after what we discovered in Part 1 and Part 2.
Mind and Soul stones from the Avengers Infinity stones
Full Story
Blog | 12 June 2019

Non-cryptographic hashing functions: The Infinity Stones of Computer Science – Part 2

In part 1 of this three-parts article we explored some of the powers of non-cryptographic hashing. This time we concentrate on the mastery of Time.
Time Infinity Stone
Full Story
Blog | 29 May 2019

Non-cryptographic hashing functions: The Infinity Stones of Computer Science – Part 1

The new number 2: “You are number six” Number six: “I’m not a number! I am a free man!” The new number 2: “Hahahahaha” The quote above (The Prisoner 1960s TV series) highlights an extreme form of hashing, I’ll grant you that. However, that is after all, a form of hashing – turning something (or someone in this case) into a number. The new number 2 must have been a computer scientist because he is laughing his head off at number six’s accusing objection. Number 2 was clearly looking at a much bigger picture! How powerful can such simple concept possibly be? In this three-parts article I will argue that hashing functions are Computer Science’s own Infinity Stones!
Power and Space Infinity Stones
Full Story
Tutorial | 01 September 2013

How to? JAR signing using openssl certificates

This is a quick and to the point video on how to sign a Java ARchive (JAR) file using an openssl self-signed certificate.
Screen showing code
Full Story
Tutorial | 13 April 2013

How to? SSL basics

A quick and dirty explanation of SSL from the point of view of the SSL handshake and a quick look at Self-Signed Certificates and what they are for.
Full Story
Tutorial | 05 November 2011

How to? Installing an SSL certificate on Apache (Part 3 of 3)

This is the third of a three-part video where we show how to install an SSL certificate onto an Apache webserver.
Full Story
Tutorial | 05 November 2011

How to? Installing an SSL certificate on Apache (Part 2 of 3)

This is the second of a three-part video where we show how to install an SSL certificate onto an Apache webserver.
Full Story
Tutorial | 05 November 2011

How to? Installing an SSL certificate on Apache (Part 1 of 3)

This is the first of a three-part video where we show how to install an SSL certificate onto an Apache webserver.
Full Story