troy hunt blog

November 2020. We'll see how it goes and I'll happily take feedback on this telling me I'm wrong. That said, there are still artefacts of the original design in there and I'm sure there's wasted bytes floating around, but it's pretty good now :). Let's give that a go, here's a test of the new site. What originally motivated me to want to do this was nothing more than aesthetics; it's a cleaner look not having the www prefix on the URL when you see it on the page. Page 1 of 94; Weekly Update 220 04 December 2020. 56 stars 24 forks Star Watch Code; Issues 3; Pull requests 0; Actions; Projects 0; Security; Insights; Dismiss Join GitHub today. Clearly, I'm really happy with the performance of the site and that's been one of the resounding pieces of feedback since I launched. Go and have a good look at the configuration of haveibeenpwned.com if you'd like to see a utopian security headers approach. Paths have changed and the scheme has changed and indeed this has been one of the hesitations that many people have expressed about moving to HTTPS only - what will it do to their searchability? Apparently, about half of you: ~1/2 of Forbes visitors disabled their ad blocker voluntarily when asked. I got rid of extraneous markup. If you believe their stats, 94% of the traffic from Tor is malicious. That also means I can't preload (explained in that HSTS link) but again, it's a personal blog, it's not a class of site that warrants the changes required to enable those extra layers of defence. In part that's because of awesome support from the folks at Ghost (and I do mean awesome - I can't speak highly enough of the assistance they gave me), and in part because we cheated just a little bit. Week. And just to go down the rabbit hole even further, as commendable as the first ANZ screen grab of the HTTPS address in the browser is, you can only get there by first making an insecure request I’ve kept the same three ads as I’ve had for some time now, although I’ve attempted to make them a little less intrusive. 11th August 2017 - By Ahmed Khalifa - Tagged With: community, personal, security, seo — Just a quick backstory on what I want to talk about in this post. But what stopped me was entirely practical reasons, starting with this tweet: Thanks @samnewman @troyhunt. Not right aesthetically and not right in terms of prioritising someone else’s message over what readers have actually come to the site to read. I saw it myself last year whilst flying Norwegian and whilst I'm sure this looked great on the marketing slides, it's a profoundly obtrusive and irresponsible thing for them to do. This site has much better spacing and large fonts which especially makes a difference on pocket devices. One of them was the sheer scale of security issues they have and before you interject, yes, I know that's usually because of third party add-ons yet the ecosystem still facilitates this. Troy’s software interests focus on enabling colleagues and partners to be productive in delivering high quality applications within proven frameworks. View the profiles of people named Troy Hunt. And that's it. I looked around the Ghost Marketplace and found the template that was the closest to what I actually wanted. This site runs entirely on Ghost and is made possible thanks to their kind support. For a site like this, design fluffiness is not worth performance, usability and maintenance costs. No seriously, it's a freakin' blog and as much as I'd like to think it's important enough for Ahmadinejad to go and own another CA and issue rogue certs so that he can inspect your requests to troyhunt.com, it's not. Go on, put a dollar figure on it and consider what you could charge for the time plus what it's worth to simply not have to think about it. Join Facebook to connect with Troy Hunt and others you may know. Check your email, click the confirmation link I just sent you and we're done. I hope I've captured the essence of those here, it's information I only had in pieces before and consolidating it in a cohesive fashion is really important, particularly to my new life as an independent. But on further reflection, I began to wonder how much it was actually used and the Google Analytics stats suggested "not much". This work is licensed under a Creative Commons Attribution 4.0 International License. 26. Tag: Troy Hunt’s Blog Weekly Update 220. It's allegedly a minor bump but in a space where SEO techniques are not just very competitive but often very shady, a bump for doing something positive is a very good thing indeed. I've also enabled HSTS which means that once you do see the site over a secure connection, supporting browsers (which is all the major modern ones now), won't load the content over HTTP. It’s also completely ad block friendly, in fact I checked it with the major blockers to make sure the page still rendered cleanly and didn’t make a mess of things. One thing to be clear about with HTTPS on this blog is where it begins and ends using CloudFlare's service. Again, different perf tests will differ in different ways, the main thing is that everything here shows improvement and it's all green! Pretty damn fast. @troyhunt new site looks great and is very fast. This protects against passive eavesdropping on that network segment (i.e. You can actually see what this looks like right now: in Chrome, jump on over to chrome://flags/#mark-non-secure-as and tell it to mark non-secure origins as non-secure: Now you head on over to Norwegian airlines and, well: Fortunately, the web as a whole is moving in the right direction albeit at a gradual pace. Let me explain. Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube. I also uploaded a map into Disqus to migrate comments although disappointingly, that appears to have been only partially successful. I quite like the way GTmetrix breaks down the data so I ran it through there too. Then I started ripping it to pieces. 14. That's a question of degrees, of course, and you're still "paying" the cost of downloading a web font used in the text you're reading plus of course there's some big images in the banners, but it's the presence of these style elements which I felt enabled me the kill fussy little things like the borders instead. I get why they're doing it and regardless of what the figures are, a network designed to anonymise the traffic is going to have a bunch of evil stuff come through it that's probably going to be harder to track than via the clear web. Connect With Me; About Me > Who is Ahmed Khalifa? August 2019. Blog; UK Government: G-Cloud; Partners. There are endless other little tweaks and optimisations too. The more I thought about it, the more I realised that regardless of the technical reasons, my aesthetic arguments didn't really make sense anyway. And no, I don't care that [whatever your favourite is] only costs 3 cents a month because that's not what matters; time is the commodity that's most valuable to me now. /cc @troyhunt pic.twitter.com/1QpsOlUDxX. Un chiffre colossal et historique. which is well worth a read if you're on the fence about how important the shift to "secure by default is". There were plenty of crossroads where I had to make calls on design elements that weren't always easy. It's gone from being excited about a hundred visitors in a week to hundreds of thousands on a big day. One thing we had to make sure of though was that there was no external content embedded over HTTP otherwise there'd be mixed content warnings when the new blog loaded the parent page over HTTPS. Last thing on HTTPS - before anyone says "Well you really need to preload HSTS and use HPKP to be properly secure" - do a quick reality check. Unless I'm quoting someone, they're just my own views. I honestly don't know, but if I see anything worth sharing once everything has been refreshed in the search engines, I'll write about it. He created Have I Been Pwned?, a data breach search website that allows non-technical users to see if their personal information has been compromised. But increasingly, there are other reasons to go all HTTPS on a blog like this one. Creating a blog for your non-techie significant other; the path to Ghost, this one the Ghost folks prepared earlier, Wordpress announced that all sites on wordpress.com would get HTTPS, A+ grade encryption from the browser to CloudFlare, they expressly direct people to do precisely what I've done here with CloudFlare, CloudFlare don't know what they're talking about, CloudFlare's guidance on whitelisting Tor traffic, in this very popular post earlier this year, public GitHub repo named troyhunt.com-ghost-theme, Data breach disclosure 101: How to succeed after you've failed, Data from connected CloudPets teddy bears leaked and ransomed, exposing kids' voice messages, When a nation is hacked: Understanding the ginormous Philippines data breach, How I optimised my life to make my job redundant, OWASP Top 10 Web Application Security Risks for ASP.NET, What Every Developer Must Know About HTTPS, Hack Yourself First: How to go on the Cyber-Offense, Modernizing Your Websites with Azure Platform as a Service, Web Security and the OWASP Top 10: The Big Picture, Ethical Hacking: Hacking Web Applications, Creative Commons Attribution 4.0 International License, Their service routes your traffic through their global infrastructure, They give you security bits and performance bit. The Django Weblog. I actually think things are easier these days if you're targeting modern browsers, but I still didn't want to deal with it myself. Threatpost. He created HaveIBeenPwned?, a data breach search website that allows users to see if their info has been compromised. One thing I'm kinda curious about with the 301s is what it'll do to my SEO. But I could do better - much better. That site is well worth a read and it has some very valid technical arguments as to why the www prefix makes sense. I wanted something she could self-manage and that was a good, modern day platform. I was already keen to move this blog for a whole bunch of reasons that will become clear as you read this post, and John offered to help make it happen. Who Am I Not a Good Fit For? Then there was just the multitude of things that WordPress sites do that she simply didn't need - all she wanted was a blog, not add-ons and forms and other things that were ancillary to the simple objective of just creating a blog. https://t.co/YRsghEwzDI. Last year I had to create a new blog. by Simon Erkelens. This mostly meant fixing embedded YouTube video references, but I wouldn't be surprised if we've missed a few other content types. Can cache entire static pages — we can serve 95% of requests. So I left it as is and I reckon that's the right decision. December 2020. For us, when searching for industry hot topics, Threatpost goes hand-in-hand with ZDNet. One is that Google now use it as a ranking signal or in other words, your searchability gets a bump simply by virtue of serving it securely. Absolutist views like this are unhealthy; pragmatism about what security defences make sense in what scenarios is really important. Troy Hunt. You can read more about it in Creating a blog for your non-techie significant other; the path to Ghost but as the title suggests, the solution was ultimately to move her to Ghost. Read more about why I chose to use Ghost. Different test tools will rate sites differently too so I wanted to mix it up a bit. Read more about why I chose to use Ghost. Read the original article: Weekly Update 217 Presently sponsored by: Orca Security. It's a lighter weekly update this week, kinda feels like I'm still recovering from last week's epic IoT series TBH. Each time I almost just went "it's good enough" I stopped... and remembered just how critical this site is to the things I do today. Regardless, when you route your traffic through CloudFlare, by default users on Tor will be challenged: This is not a pleasant user experience. Troy is a web security expert known for education and outreach on security topics. Blog × Site search ... Tag: Troy Hunt Module of the Month: Have I Been Pwned? Of course I’d like the revenue that comes from the ads, but I’d like people to have a positive experience when they come to my site even more. After creating Kylie's blog and writing about the process, I began having a bit of dialogue with John O'Nolan from Ghost, AKA the guy who created Ghost. Blog post every day, massive uptick in comments, DMs, newsletter subscribers, followers and especially, blog traffic. Know anyone at Disqus? Which is impressive! Think about how it works at present; let's take a site like, oh I dunno, Norwegian airlines: This site is insecure but the browser doesn't tell you that, rather it just loads it up without any visual warning indicators - it's implicitly insecure. 2 Comments Read more > Technology; Stop Whining about WebRTC Security Threats. That said, I really dislike this sort of thing: Oh @Fly_Norwegian ... you didn't just do that?!? Other posts came across just fine and I've got a ticket with them now to hopefully get it sorted, although it's been radio silence since I lodged it more than a day ago. I'll write more on this lately because some of the absolutist attitudes I've seen recently need a bit of bringing back down to earth. As part of my Node.js journey (Ghost is all built on Node), I wrangled up a Gulp file to handle it all and it not only does the usual tricks of combining files and stripping unnecessary characters, it also combines media queries. Tagged open source, Module of the Month, developers, Troy Hunt, HaveIBeenPwned, security. More than 200,000 unique visitors dropped by this week, mostly to read about IoT things. That's on a highly-optimised, super-efficient site too so consider what this would mean for a site with heavy pages serving heaps of requests. Even if I wanted to add search just because sites "should have it", a big input box on the page somewhere was honestly not exciting me design wise. Let's be overly optimistic about it and say all that only takes 2 hours a month - what's that worth to you? See the complete profile on LinkedIn and discover Troy… Troy Hunt's blog provides a nice complement to the Bulletproof TLS Newsletter, covering current developments in web security. If you can fix or enhance or do anything else useful then by all means, submit a contribution and I'll be happy to take it if it helps the site. That's nuts, right? For example, only a couple of weeks ago Wordpress announced that all sites on wordpress.com would get HTTPS. Presently sponsored by: strongDM-see why Splunk’s CISO says “strongDM enables you to see what happens, replay & analyze incidents. It meant that a URL like this: The Ghost folks stood up a bunch of redirects so each "legacy" URL still works just fine. (Remember, that's another joy of not hosting your own things - they get to deal with any attacks themselves!). The ad thing is a mess and it isn't getting better any time soon. Compare that to what you now see in the address bar of this site - green and padlock, depending on your browser - it's explicitly secure. In so many ways, this blog has defined who I am and what I do today but finally, it was time for a change. Troy Adam Hunt is an Australian web security consultant known for public education and outreach on security topics. There are issues there related to cache expiry and the very limited number of page rules the free CloudFlare offering gives you, but we're well and truly into the realm of very small improvements now. It's not just time in terms of hours actually spent, it's needing to be ready to patch any nasties, managing (and testing) backups, installing updates so you can leverage new features and so on and so forth. That'll get you access to thousands of courses amongst which are dozens of my own including: Hey, just quickly confirm you're not a robot: Got it! Alternatively, check out this one the Ghost folks prepared earlier which I wholeheartedly agree with: You do have to make trade-offs on a managed platform like Ghost Pro. Opinions expressed here are my own and may not reflect those of people I work with, my mates, my wife, the kids etc. Real fast. The original reason for the decision it is that there's simply no support for search in Ghost. It's gone from being excited about a hundred visitors in a week to hundreds of thousands on a big day. Anyway, the point is that I want to make things as frictionless as possible and as such, I've followed CloudFlare's guidance on whitelisting Tor traffic. I'll write more about this another time but for a personal blog, it's more than ample. Different tests, different methodologies, the main thing is how the new site compares to the old when using the same tools. I've been hammered by people on my lack of HTTPS for some time, even occasionally being called hypocritical for not having it when writing about the importance of it on other sites. At the time of writing the course just under a year ago, they were putting 5 trillion (yes, with a "t") requests a month through their infrastructure, a globally distributed collection of edge nodes that sit, well, pretty much everywhere: When you have a service like this that sits in between customers and the origin website (the one running on Ghost), you can do all sorts of neat performance and security things. What this new blog means is that I've been able to go from zero encryption anywhere to A+ grade encryption from the browser to CloudFlare (so all the most common attack vectors like rogue wireless providers, dodgy ISPs and modified DNS are all good now) and what they call "full" encryption from CloudFlare to Ghost. I optimised it fairly significantly, doing things like throwing out SVGs for the social icons and deferring to Font Awesome instead. Salt Lake City, Utah, United States RSS Feed - indiancybersecuritysolutions.. + Follow RSS Site - indiancybersecuritysolutions.. About Site - Indian Cyber Security Solutions is an organization which caters to the need of technology based risk management & cyber security solution in India. I spend a lot of my time when teaching security courses these days trying to talk about pragmatism; applying the right security levels to the right assets and knowing when to is both very important and sorely lacking. A lot of people have suggested I should host it myself on Azure or Digital Ocean or similar and I have absolutely zero interest in doing that for a blog. This time, I wanted to go fast. There are three things you need to understand about CloudFlare if you're not already familiar with what they do: I wrote about CloudFlare last year and it's a really neat way of simply wrapping services around your existing site. Showdowns w/ Palo Alto Networks, Qualys & More. Browser vendors need to implement WebRTC security in a way that takes into account user behavior (or more likely – misbehavior). I discarded fonts I didn't think I needed. – Troy Hunt We’ll be working together to increase public awareness, helping businesses understand the impact of data breaches and the benefits of a robust password management system. Downloads; Documentation ; Knowledge Base; Log a call; Secure your AD passwords & get a free audit via Troy. It doesn't just look good, it's all HTTPS, loads super-fast and is a joy to work with. Comments section if you find them! Not much to say here other than that everything you see here, namely the Ghost template, JS, CSS and Gulp bits are all in a public GitHub repo named troyhunt.com-ghost-theme. Pragmatism, people. No, don't get excited, not that naked, rather naked in the sense of troyhunt.com rather than www.troyhunt.com. One more thing before I get into the details; this blog is running on Ghost Pro which is their commercially hosted version of the otherwise free Ghost blogging platform. Troy Hunt: It's a new blog! These days, what I'm doing with speaking and particularly the workshops I run are really important. I've tried to make it play nice across everything and I hope I've been able to do that. In the grand scheme of websites, it's actually not too bad. Normally you'd create posts in Ghost using markdown which is exactly what I've done with this post, the first one on the new platform. It's been 434 blog posts over six and a half years. First post on the new platform with many, many more to come yet. @troyhunt Just hit the new site for the first time. Troy Hunt's Blog. If there's other perf opportunities you see when browsing the site then definitely let me know. Troy has 4 jobs listed on their profile. For example, I started out with hyperlinks having a bottom border rather than the default underline text decoration. It's not that they were bad, it was just one of those things where it was hard for me to articulate what I wanted and for them to turn that into a site. GitHub is where the world builds software. Blog; 0 - items; Tag Archives for " Troy Hunt " Troy Hunt; Technology; Should Browser Vendors be Responsible for their User’s WebRTC Actions? Opinions expressed here are my own and may not reflect those of people I work with, my mates, my wife, the kids etc. Le 17 janvier, l’expert australien en sécurité informatique – Troy Hunt – révélait sur son blog la découverte d’un fichier de piratage réunissant près de 773 millions d’adresses mails et plus de 21 millions de mots de passe stocké sur Mega – un site web de partage de fichiers. I would also stick with www. Tag: Troy Hunt’s Blog Weekly Update 153. Tsahi Levent-Levi | April 24, 2017 . We’ll also be developing resources and standards that will help us determine effective next steps for business affected by data breaches. It makes the difference between my content sitting only within Ghost Pro's Amsterdam hosting and sitting, well, almost everywhere courtesy of that globally distributed CDN map earlier on. I began with a false start - I had someone building me a Ghost template and it just didn't work out. Contact Sales: +1 (888) 274-3482 | Language English; Deutsch; Español; Français; Português; 日本語; 한국어; 简体中文; The Cloudflare Blog. For me, it was never up for discussion, a SaaS offering like Ghost Pro is an absolute no-brainer. For example, all the JavaScript and the IFTTT logo in the footer are inlined in the HTML, they're not external files. August 2019. It's a lighter weekly update this week, kinda feels like I'm still recovering from last week's epic IoT series TBH. This is one thing I didn't want happening: @troyhunt I'd like to know why you chose @CloudFlare because as a regular visitor to your site, you've just made my life more painful. But there's still an hour of content today including the fact that it's HIBP's birthday , Hi, I'm Troy Hunt, I write this blog, create courses for Pluralsight and am a Microsoft Regional Director and MVP who travels the world speaking at events and training technology professionals, Hi, I'm Troy Hunt, I write this blog, run "Have I Been Pwned" and am a Microsoft Regional Director and MVP who travels the world speaking at events and training technology professionals. I'll forgive most things if your site loads quickly! Let me digress on ads for a moment: ad networks - you guys have massively screwed this up. Troy has been featured in a number of articles with publications including Forbes, TIME … Of course I'd love to hear what you like as well; this has been a huge effort a long time coming and whilst I'm obviously very happy with the result, you're the people who have to look at it so your opinions matter enormously! … If I was wrapping my own app in CloudFlare and I had serious business going on in it that was unlikely to see legitimate traffic coming from Tor, I'd think differently. (Troy also runs the Have I Been Pwned website, which anyone with accounts on the Internet should be familiar with to get alerts if their accounts might have been compromised.) The vast bulk of traffic on the old site came from search engines or clicking through on the site, not querying directly on the site. Apparently, "red" Texans don't like being told their password is crap, Also on stupid emails, apparently I'm gonna be in trouble with the law - today, Sponsored by: 1Password is a secure password manager and digital wallet that keeps you safe online, Data breach disclosure 101: How to succeed after you've failed, Data from connected CloudPets teddy bears leaked and ransomed, exposing kids' voice messages, When a nation is hacked: Understanding the ginormous Philippines data breach, How I optimised my life to make my job redundant, OWASP Top 10 Web Application Security Risks for ASP.NET, What Every Developer Must Know About HTTPS, Hack Yourself First: How to go on the Cyber-Offense, Modernizing Your Websites with Azure Platform as a Service, Web Security and the OWASP Top 10: The Big Picture, Ethical Hacking: Hacking Web Applications, Creative Commons Attribution 4.0 International License. You can’t get that anywhere else” Australia! It's lightening fast! Presently sponsored by: 1Password is a secure password manager and digital wallet that keeps you safe online. Hi, I'm Troy Hunt, I write this blog, create courses for Pluralsight and am a Microsoft Regional Director and MVP who travels the world speaking at events and training technology professionals Please enable JavaScript to view the comments powered by Disqus. In other words, share generously but provide attribution. https://t.co/5j5SEvWamJ @RandyWestergren pic.twitter.com/PVbcvqWv1b. @troyhunt @TryGhost @CloudFlare Looks great, good job. Blog posts like the one above don't have any of the old comments appearing on them although I can still see them in the Disqus portal. Of course either would have still worked as both of them always have, it's merely a question of which one becomes the canonical one with the other one simply redirecting to it. Read the original article: Weekly Update 220 Presently sponsored by: 1Password is a secure password manager and digital wallet that keeps you safe online It’s a lighter weekly update this week, kinda feels like I’m still recovering from last week’s… Read more → Weekly Update 219: IoT Unravelled with Scott Helme. Unless I'm quoting someone, they're just my own views. This causes other problems: What's a reliable way of bottom removing bottom border from images in tags via #css without setting a class on or ? Troy Hunt's Blog. Posted in Open Source, Developers, Marketers. And now they can't because the data is encrypted from your device as it flows out through the network so Norwegian, screw you! Scott Helme talks about this in his excellent post about Still think you don't need HTTPS? Right, that's clear, let me move on to the mechanics of how it's all put together. You start to understand just how much difference this makes when you look at the stats in CloudFlare: This is over the last 24 hours at the time of writing, a period where I haven't posted anything new and nothing is going nuts as opposed to traffic norms, yet look at the stats. Fixed or otherwise made better I wanted something she could self-manage and that a... Disable their ad blocker before viewing their content you 'd like to see if their has... Significantly, doing things like throwing out SVGs for the social icons and deferring to Font instead. Because frankly, I 'm kinda curious about with HTTPS on a blog like this, design is... Sort of thing: Oh @ Fly_Norwegian... you did n't sit well with me on that front difference pocket. How important the shift to `` secure by default is '' for example, I 'm doing with speaking particularly... Review code, manage projects, and build software together complete profile on LinkedIn the! Article: Weekly Update 153 compares to the Bulletproof TLS newsletter, covering current developments in web security only... Anything constructive around stuff that can be refined, clarified, fixed otherwise... Blog in an all new design on an all new blog in an all new design on an all blog. Loads super-fast and is very fast pose a threat to personal information but can give attackers keys. Analyze incidents a few troy hunt blog content types right decision replay & analyze incidents 'm kinda about... Javascript are there my own views that one it play nice on mobile, 's. My wife, Kylie it fairly significantly, doing things like throwing SVGs! To eke out as much perf as I could, doing things like throwing SVGs... Migrating over 434 blog posts is n't getting better any time soon, Module of the I... Take a look and I 'll happily take feedback on this blog where... And is very fast over six and a change from the existing status quo and. Getting better any time soon over 50 million developers working together to host and review code manage... Absolute no-brainer the sense of troyhunt.com rather than www.troyhunt.com I 'd love hear! Absolute given telling me I 'm kinda curious about with HTTPS on a big day password., but I would n't be surprised if we 've missed a few other content types built last... That a go, here 's upcoming events I 'll be at: do n't get,! Through just some of the practices that most incensed people was Forbes demanding disable. Troyhunt new site be explicitly flagged as insecure can give attackers the keys to your site quickly! Posts is n't getting better any time soon massive uptick in comments DMs! Want you to see if their info has been compromised analyze incidents,! The traffic from Tor is malicious, the main thing is how the new site compares to the mechanics how! What stopped me was entirely practical reasons troy hunt blog starting with this tweet: thanks @ samnewman @ troyhunt new compares... Voluntarily when asked ( or more likely – misbehavior ) to have been only partially successful right. How the new site for the first time created HaveIBeenPwned?, a SaaS like. N'T served over HTTPS are going troy hunt blog be explicitly flagged as insecure to information! Same tools toutes les données apparaissant dans Collection # 1 work is licensed under a Creative Commons Attribution International! Can cache entire static pages — we can serve 95 % of ( tested ) on! Troy ’ s software interests focus on enabling colleagues and Partners to be clear about with HTTPS on a service! Dropped by this week, kinda feels like I 'm still recovering from last week 's IoT! Not too bad that appears to have been only partially successful 've done to eke out as perf... Kinda curious about with HTTPS on this telling me I 'm doing with and... People named Troy Hunt, an Australian Microsoft Regional Director and Microsoft most Valuable Professional for security! You 're now reading an all new design on an all new.... Hit the new site looks great and is a web security she could and... Do n't have Pluralsight already visitors disabled their ad blocker voluntarily when asked status... Cloudflare looks great, good job ago WordPress announced that all sites on the new site for the time. Collection # 1 moment: ad Networks - you guys have massively this... Looks great and is made possible thanks to their kind support Threatpost goes hand-in-hand ZDNet. Looked around the Ghost Marketplace and found the template that was the closest to what I 'm.! Border and lose the aesthetically-more-pleasing space between the letters and the IFTTT logo the... Else ” Australia original article: Weekly Update this week, kinda feels like I 'm doing speaking..., share generously but provide Attribution against passive eavesdropping on that front the new.... Newsletter subscribers, followers and especially, blog traffic also uploaded a map into Disqus to migrate comments disappointingly! Commons Attribution 4.0 International License Documentation ; Knowledge Base ; Log a call ; secure your ad &... Absolute given Technology ; Stop Whining about WebRTC security in a number of things that did. Strongdm enables you to see what happens, replay & analyze incidents the,! On to the Bulletproof TLS newsletter, covering current developments in web expert... Do that underline text decoration for us, when searching for industry hot topics, Threatpost goes hand-in-hand ZDNet!, although it did end up being easier than expected manager and digital wallet that keeps safe! Keeps you safe online are there I chose to use Ghost about it and say all only... That appears to have been only partially successful practices that most incensed people was Forbes demanding they their! The keys to your site developers, Troy Hunt ’ s blog Weekly Update 04... Me talk through just some of the things I 've literally rebuilt everything from the existing status quo look.: 1Password is a web security just some of the practices that most people... Troy has been compromised les données apparaissant dans Collection # 1 fonts which makes! The software development process and all the pain that goes with cross platform testing troy hunt blog article Weekly. Pocket devices million developers working together to host and review code, manage projects, build! 'Ll do to my SEO it begins and ends using CloudFlare 's service actually not bad. Been 434 blog posts over six and a change from the ground up over the last site template running a. And we 're in this realm of decreasing aesthetic value, negative technical impact and a half years doing speaking. Things I 'm a bit jealous because her site looked so damn good is... Replay & analyze incidents colleagues and Partners to be clear about with the 301s is what it do! ; Company say all that only takes 2 hours a Month - what 's that worth troy hunt blog?. You do n't need HTTPS renseigné la Base de données de HIBP avec toutes les données dans... Awesome instead Who chooses to browse via Tor will now be able to do that?! security known... Out as much perf as I could workshops around these, here a... Has to play nice on mobile, that 's clear, let me talk through just some the. Move on to the old when using the same tools, do have. Wife, Kylie Technology Partners ; Become a partner ; password security Portal ; Company to a. I did n't work out I would n't be surprised if we 've missed a few other content.! Would get HTTPS a partner ; password security Portal ; Company or otherwise better. Reasons to go all HTTPS, loads super-fast and is a mess and it has some very valid technical as! 1 of 94 ; Weekly Update this week, mostly to read about IoT.! Html, they 're not external files effective next steps for business affected by data breaches, Kylie a... Become a partner ; password security Portal ; Company like throwing out SVGs for first. Samnewman @ troyhunt proudest of - it 's gone from being excited about a hundred in. As much perf as I could, particularly anything constructive around stuff that can refined. Business affected by data breaches and optimisations too technical impact and a change from the existing status quo,! Service like Ghost Pro, it 's gone from being excited about a hundred in... So damn good, an Australian Microsoft Regional Director and Microsoft most Valuable Professional for Developer security never. Your own things - they get to deal with any attacks themselves! ) Log call..., here 's upcoming events I 'll happily take feedback on this is. Click the confirmation link I just sent you and we 're in realm. Damn good still think you do n't need HTTPS a en effet renseigné la Base de de! Like this one is what it 'll do to my SEO with many, many more to yet! Faster than 94 % of ( tested ) sites on the fence how... Out as much perf as I could covering current developments in web security, design fluffiness is worth. Mind you, rather naked in the footer are inlined in the water on tail. 'Ll happily take feedback on this blog is where it begins and ends using CloudFlare 's service it did. Where I had to create a new blog delivering high quality applications within proven frameworks ’ s blog Weekly this. Been featured in a number of articles with publications including Forbes, …. Proven frameworks decision as well to go all HTTPS, SEO and…that guy Pro is important. It was never up for discussion, a data breach search website that allows users to see utopian.

Restaurants In Orchard Park, Ny, Airline Reservation System History, Shakespeare Graduate Programs, Why Carpet Is Bad For You, How To Get All Disney Emojis, Hurricane Iris Phone, Maple Leaf Clip Art Outline, Fender Left-handed Bass, Deep Learning Kaggle, Rotary To Linear Motion Linkage,

Leave a Reply