Tagged | 2FA
-
Presentation: Your Program as a Transpiler: Applying Compiler Design to Everyday Programming
(www.infoq.com) -
A Kubernetes crime story
(engineering.prezi.com) -
Stick with security: YubiKey, SSH, GnuPG, macOS
(evilmartians.com) -
Using Hardware Token-based 2FA with the WebAuthn API
(hacks.mozilla.org) -
Protect your npm account with 2FA and Authy
(twilioinc.wpengine.com)