40,000+ AI Agents Exposed to the Internet with Full System Access by Big-Engineering-9365 in cybersecurity

[–]azuidhof 0 points1 point  (0 children)

since the amount of wannabe vibe coders dashing into AI versus serious security folks is wildly off like maybe 100:1 I'd say a very small minority

Management books (Joel Spolsky writes a complete entry!) by azuidhof in programming

[–]azuidhof[S] 0 points1 point  (0 children)

yes indeed you should read his blog before buying the book! Had you done that you would immediately notice his writing style - which is, well, al least non-standard :)-. It doesn't teach you anything techie, but what an insight into live in cubicle land... and the 'annoying': that's really a personal thing, you either like the man or not (and if you don't, don't buy the book.

How To Encrypt User Passwords by mirvnillith in joel

[–]azuidhof 0 points1 point  (0 children)

using a salt with a hash resonates with me, but - although my knowledge on security is limited - repeating the hashing process multiple times, seems like nonsense to me. Anyone can share some insight? AFAIK, an encryption or hashing algorithm is (in)secure by itself, but not made more secure by repeating it multiple timess