Source: https://habr.com/ru/post/35245/More articles:The book "Security in PHP" (part 2). Code injection attacksThe book "Security in PHP" (part 3). Cross-site scripting (XSS)The book Security in PHP (part 4). The lack of security at the transport level (HTTPS, TLS and SSL)The book "Security in PHP" (Part 5). Lack of entropy for random valuesManual cipher LS47The history of the mobile Internet: 1991 - our daysHow to become a frontend developer in 2018Issue # 16: IT training - current issues and challenges from leading companiesBelarus: blockchain and crypt regulationDecreasing Confidence in Symantec PKI: Recommendations to Site OwnersAll Articles