Source: https://habr.com/ru/post/134152/More articles:Let's throw intellectual resources to help thievish comrades!Customer feedback, or how we implemented KopiniMyProgress.comCSRF vulnerabilities on the example of HabraHabraThe basic principle of programming a controlled form in 1CDecember 10-11, Yekaterinburg will host HackDay # 21The difficulty of administering guest hotspots. Practice (part 2)Vulnerability in Facebook has opened access to private photo users (including Zuckerberg)Registering global hotkeys using WPFPostgreSQL Development Coordinator to visit MoscowAll Articles