Security 108: The Other Stuff
We’ve been working on this series for a while now (as you can gather from the series links below), and as such have covered a number of different areas:
- Encyption
- Hashing
- Rainbow Tables
- Salting
- Improper practices
- Key Stretching
- Algorithms
However, there are a couple of things we wanted to mention before we wrap everything up.