Blog Tag: Security

Thoughts, insights all hot off the virtual press.

Blog | 17 August 2022

Membership website security: how to keep your site safe and secure

If you’re running a membership website, member safety – and your reputation – hinges on your ability to keep data confidential and secure. Poorly designed or maintained systems put your community at risk, leading to poor performance and loss of trust. Here’s what to avoid and how to improve it.
Membership websites
Full Story
Blog | 27 May 2021

15 good reasons to redesign your website

Worried your site might need a refresh? Here are 15 signs you might need a new website – and what to do about them.
Person lying face down on a desk
Full Story
Blog | 03 June 2020

How to improve your WordPress security

We implement a range of measures to enhance security and protect against targeted attacks.
Image representing digital security - a lock superimposed on a motherboard
Full Story
Blog | 04 September 2019

Non-cryptographic hashing functions: The Infinity Stones of Computer Science – Part 3

In this last instalment of the three-part article exploring non-cryptographic hashing we reveal two more amazing applications after what we discovered in Part 1 and Part 2.
Mind and Soul stones from the Avengers Infinity stones
Full Story
Blog | 12 June 2019

Non-cryptographic hashing functions: The Infinity Stones of Computer Science – Part 2

In part 1 of this three-parts article we explored some of the powers of non-cryptographic hashing. This time we concentrate on the mastery of Time.
Time Infinity Stone
Full Story
Blog | 29 May 2019

Non-cryptographic hashing functions: The Infinity Stones of Computer Science – Part 1

The new number 2: “You are number six” Number six: “I’m not a number! I am a free man!” The new number 2: “Hahahahaha” The quote above (The Prisoner 1960s TV series) highlights an extreme form of hashing, I’ll grant you that. However, that is after all, a form of hashing – turning something (or someone in this case) into a number. The new number 2 must have been a computer scientist because he is laughing his head off at number six’s accusing objection. Number 2 was clearly looking at a much bigger picture! How powerful can such simple concept possibly be? In this three-parts article I will argue that hashing functions are Computer Science’s own Infinity Stones!
Power and Space Infinity Stones
Full Story
Tutorial | 01 September 2013

How to? JAR signing using openssl certificates

This is a quick and to the point video on how to sign a Java ARchive (JAR) file using an openssl self-signed certificate.
Screen showing code
Full Story
Tutorial | 13 April 2013

How to? SSL basics

A quick and dirty explanation of SSL from the point of view of the SSL handshake and a quick look at Self-Signed Certificates and what they are for.
Full Story
Tutorial | 05 November 2011

How to? Installing an SSL certificate on Apache (Part 3 of 3)

This is the third of a three-part video where we show how to install an SSL certificate onto an Apache webserver.
Full Story
Tutorial | 05 November 2011

How to? Installing an SSL certificate on Apache (Part 2 of 3)

This is the second of a three-part video where we show how to install an SSL certificate onto an Apache webserver.
Full Story
Tutorial | 05 November 2011

How to? Installing an SSL certificate on Apache (Part 1 of 3)

This is the first of a three-part video where we show how to install an SSL certificate onto an Apache webserver.
Full Story