TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Show HN: Security Training for Developers

128 点作者 malcolmhere大约 9 年前

20 条评论

CiPHPerCoder大约 9 年前
Went through the SQL injection demo, and it recommends parametrized queries. Excellent.<p>EDIT:<p>Joined with Github, went through the password handling section, then saw this:<p><a href="http:&#x2F;&#x2F;i.imgur.com&#x2F;H4h5FUY.png" rel="nofollow">http:&#x2F;&#x2F;i.imgur.com&#x2F;H4h5FUY.png</a><p>No no no no NO! Do NOT use SHA256 for passwords.<p><a href="https:&#x2F;&#x2F;paragonie.com&#x2F;blog&#x2F;2016&#x2F;02&#x2F;how-safely-store-password-in-2016" rel="nofollow">https:&#x2F;&#x2F;paragonie.com&#x2F;blog&#x2F;2016&#x2F;02&#x2F;how-safely-store-password...</a><p><a href="https:&#x2F;&#x2F;codahale.com&#x2F;how-to-safely-store-a-password&#x2F;" rel="nofollow">https:&#x2F;&#x2F;codahale.com&#x2F;how-to-safely-store-a-password&#x2F;</a><p>PBKDF2-SHA256 with 100k or more iterations? Okay, fine.<p>SHA256 the cryptographic hash function not designed for password storage? Bad advice.
TACIXAT大约 9 年前
Security is hard. XSS lol.<p><a href="http:&#x2F;&#x2F;i.imgur.com&#x2F;3QJfsu7.png" rel="nofollow">http:&#x2F;&#x2F;i.imgur.com&#x2F;3QJfsu7.png</a>
评论 #11257606 未加载
评论 #11257526 未加载
greggh大约 9 年前
This is so beautiful that I wish it was good advice, but it&#x27;s not. Some of these examples actually introduce problems. SHA-256? Really?
评论 #11257404 未加载
ivanhoe大约 9 年前
You should add some sort of About Us section because for this type of lessons I really need to know who is behind the site, what are his&#x2F;her references &amp; experience. Bad advice is often worse than no advice at all, and to be a trustful source of security info we need at least to have some basic info on authors. And these obviously fake &quot;What People Are Saying&quot; are not helping with the trust issue either.
michaelmior大约 9 年前
The bit on unencrypted communication should really mention HSTS. If you&#x27;re connected to a network controlled by an attacker, using TLS on its own doesn&#x27;t help you. HSTS doesn&#x27;t necessarily help you either, but it&#x27;s a lot more likely to solve the problem in the given scenario.
billyhoffman大约 9 年前
Slick and a nice UI, but the security advice in this is just plain terrible.<p>Blacklist input validation as defense against XSS? Are you kidding me? And then over to session fixation, where I see the exact same ?jessionid=blah example that has been in any Web Security book for the last 10-15 years? Come on!
评论 #11258705 未加载
评论 #11258272 未加载
Dowwie大约 9 年前
Are we looking at an MVP? I suspect so. Evidently, you are onto something that many would find useful. Please, keep going!
dagrz大约 9 年前
I feel like Secure Code Warrior has solved this problem much better with gamification.<p><a href="https:&#x2F;&#x2F;www.securecodewarrior.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.securecodewarrior.com&#x2F;</a>
评论 #11260088 未加载
michaelmior大约 9 年前
&gt; Imagine if a user has their email account hacked - the first thing an attacker will do is try to compromise their other online accounts, and long-lived password reset links make this easy.<p>I don&#x27;t see how the length of time the reset link is valid really has any bearing here. I&#x27;m assuming the implication is that an attack could search for old password reset emails but if they have access to the email account, why not just request another reset?
评论 #11260112 未加载
评论 #11258326 未加载
barbs大约 9 年前
At a glance this seems to be aimed mostly at <i>web</i> developers. How much of this would be relevant for a native mobile developer like myself?
评论 #11257403 未加载
cpcarey大约 9 年前
I&#x27;m enjoying this a lot. The explanations are straightforward and the writing and animation style is entertaining. I&#x27;m liking the website parodies and the puns in the alt texts. I&#x27;m learning new things and the linked resources are good for going in-depth. I&#x27;d probably pay for advanced lessons in this style. I&#x27;ll be recommending to friends!
bsrx大约 9 年前
Signed up, got <a href="https:&#x2F;&#x2F;www.hacksplaining.com&#x2F;profile.json" rel="nofollow">https:&#x2F;&#x2F;www.hacksplaining.com&#x2F;profile.json</a>
HoyaSaxa大约 9 年前
@malcolmhere keep up the great work. I have always found the current resources to be lacking especially in terms of implementation examples. One suggestion would be to remove the Chase logo in your SQL injection examples. It is just begging for a cease and desist letter.
michaelbuckbee大约 9 年前
I like Troy Hunt&#x27;s web security stuff - I&#x27;d gotten into it on Pluralsight, but then moved jobs and don&#x27;t have access. I did find a free course (With SQL Injection, etc.) of his here: <a href="https:&#x2F;&#x2F;info.varonis.com&#x2F;web-security-fundamentals" rel="nofollow">https:&#x2F;&#x2F;info.varonis.com&#x2F;web-security-fundamentals</a>
amgin3大约 9 年前
seems like it only explains the very basics that anyone who has been a developer for at least a year would already know.
reledi大约 9 年前
Regarding the customer references, I&#x27;m always highly suspicious of anonymous praise. Do you not have permission from the authors or companies to use their name?
bsrx大约 9 年前
Any comments on who put this together, or their long term goals?
评论 #11257400 未加载
zmitri大约 9 年前
Enjoyed this a lot. Great starting point for anyone interested.
cphoover大约 9 年前
very well put together
SandersAK大约 9 年前
Awesome! This is great!
评论 #11256899 未加载