Chinmay Pandyachinmaypandya.hashnode.dev·May 16, 2024Secure Your APIs (Part 1) : Leakage and ProxyingAPI Leakage Everybody uses APIs in their applications but did you know that your API request might contain sensitive information which you might not wanna share with others, such as API keys/tokens. API keys/tokens are a way in which you can authoriz...35 readsAPIs
Prince Kouaméblog.princekouame.com·Dec 19, 2023L'attribut "unselectable" en HTML : contrôler la sélection de texteL'attribut HTML peu connu "unselectable" permet de rendre du texte non sélectionnable par l'utilisateur. Examinons ensemble son utilité. 1. Fonctionnement de "unselectable" Ajouté à un élément HTML, l'attribut unselectable" empêche la sélection de so...attributUnselectable
Ethan Mitchellcybershield.hashnode.dev·Oct 25, 2023Cryptographic Protocols: The Pillars of Digital SecurityIn the increasingly connected and digitized world we inhabit, the need for robust digital security has never been more critical. The proliferation of digital communications, online transactions, and data sharing has made cybersecurity a fundamental c...digital security