Security 108: The Other Stuff

Secure Cloud Computing

Hashing keeps your users info secure.
Credit: Flickr user FutUndBeidl

We’ve been working on this series for a while now (as you can gather from the series links below), and as such have covered a number of different areas:

  • Encyption
  • Hashing
  • Rainbow Tables
  • Salting
  • Improper practices
  • Key Stretching
  • Algorithms

However, there are a couple of things we wanted to mention before we wrap everything up.

More →