Christopher D. Langton
Author Mailing List & Cybersecurity topics

Latest

Jan
31
Exploring Delayed Dialogue Attribution

Exploring Delayed Dialogue Attribution

Fellow writers, we need to talk.. about talking properly. Delayed dialogue attribution is why a lot of readers get bored,
4 min read
Jan
14
Navigating the Complexities of an ISBN (and an announcement)

Navigating the Complexities of an ISBN (and an announcement)

5 min read
Oct
23
Understanding Digital Signatures: More Than Just a Hash

Understanding Digital Signatures: More Than Just a Hash

Digital signatures are a cornerstone of modern security practices, ensuring data integrity and authentication in various online communications. But there&
6 min read
Oct
18
Word processors are holding you back!

Word processors are holding you back!

2 min read
Oct
06
Editors feedback for Sentience Chapter 4

Editors feedback for Sentience Chapter 4

4 min read
Oct
04
Why PASETO Might Not Be the JWT Replacement We Hoped For

Why PASETO Might Not Be the JWT Replacement We Hoped For

PASETO, a potential alternative to JWT, has sparked conversations within the security and developer community alike (for once). While PASETO
3 min read
Sep
05
Sentience Chapter 9 - Book 3 of Sentinel Unleashed

Sentience Chapter 9 - Book 3 of Sentinel Unleashed

If you thought rogue AI and world-altering chaos were intense, just wait until you delve deeper into the secrets that lie within the pages of this captivating series.
7 min read
Sep
05
Unveiling the Myths of Multi-Factor Authentication

Unveiling the Myths of Multi-Factor Authentication

MFA refresher Multi-Factor Authentication (MFA) is a security practice that requires users to provide two or more distinct authentication factors
9 min read
Sep
01
Unlocking Your Tech Success - 5 Essential Lessons

Unlocking Your Tech Success - 5 Essential Lessons

Ever wondered what it takes to thrive in the tech world, not just as a coder but as a tech-savvy
2 min read
Aug
28
Show, don't tell

Show, don't tell

3 min read