1. 1
  1.  

  2. 4

    I mean, this is pretty much all bad and written as if by a marketing communications manager, but this bit right here is impressive:

    And my personal favorite: you could even copy-and-paste part of your code from security handbooks! If for example, you realize you use weak cryptography, you could quickly solve the problem by taking free, plug-and-play cryptographic functions implementations that are available online: the well-known OpenSSL could be such an example. Begone, countless hours of development!

    1. 1

      That’s hilarious.