The Secure Coder logo
The Secure Coder
Subscribe
The Secure Coder

The Secure Coder

Simplifying software security for every developer

Connect

Archive

The Power of Zero Knowledge Proof
May 01, 2025

The Power of Zero Knowledge Proof

Mahdi Mashrur Matin
Mahdi Mashrur Matin
Password Handling Tier List: Worst to Best
Apr 24, 2025

Password Handling Tier List: Worst to Best

Mahdi Mashrur Matin
Mahdi Mashrur Matin
13 Principles for designing secure application
Apr 17, 2025

13 Principles for designing secure application

Mahdi Mashrur Matin
Mahdi Mashrur Matin
 Why you should not build your own authentication systems
Apr 10, 2025

Why you should not build your own authentication systems

Mahdi Mashrur Matin
Mahdi Mashrur Matin
Hashing, encoding & encryption- When to use which ?
Mar 26, 2025

Hashing, encoding & encryption- When to use which ?

Mahdi Mashrur Matin
Mahdi Mashrur Matin
How to Bulletproof Your Software with Zero Trust
Mar 21, 2025

How to Bulletproof Your Software with Zero Trust

Mahdi Mashrur Matin
Mahdi Mashrur Matin
TLS 1.3 Handshake Explained Simply
Mar 11, 2025

TLS 1.3 Handshake Explained Simply

Mahdi Mashrur Matin
Mahdi Mashrur Matin
Simplifying software security for every developer

The Secure Coder

Simplifying software security for every developer

Home

Posts

© 2025 The Secure Coder.

Privacy policy

Terms of use

Powered by beehiiv