<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security on exitcode</title>
    <link>https://exitcode.eu/tags/security/</link>
    <description>Recent content in Security on exitcode</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Wed, 18 Mar 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://exitcode.eu/tags/security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Why are software updates important?</title>
      <link>https://exitcode.eu/posts/biztonsag-alapok-11/</link>
      <pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://exitcode.eu/posts/biztonsag-alapok-11/</guid>
      <description>&lt;h1 id=&#34;why-are-software-updates-important-vulnerabilities-explained-simply&#34;&gt;&#xA;  Why are software updates important? Vulnerabilities explained simply&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#why-are-software-updates-important-vulnerabilities-explained-simply&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;The &amp;ldquo;Update later&amp;rdquo; button is one of the most frequently clicked buttons in our digital lives. This is understandable, because updates interrupt our work, take time, and don’t seem to bring any visible changes. However, something quite different is happening in the background.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-is-a-vulnerability&#34;&gt;&#xA;  What is a vulnerability?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#what-is-a-vulnerability&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;All software contains bugs. Some of these are merely inconveniences, usually resulting in the program freezing or displaying something incorrectly. Other bugs, however, represent security vulnerabilities: an attacker can exploit them to gain access to the device, steal data, or run malicious code.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How Does HTTPS Work?</title>
      <link>https://exitcode.eu/posts/biztonsag-alapok-10/</link>
      <pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://exitcode.eu/posts/biztonsag-alapok-10/</guid>
      <description>&lt;h1 id=&#34;how-does-https-work-and-why-is-the-padlock-icon-important&#34;&gt;&#xA;  How does HTTPS work, and why is the padlock icon important?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#how-does-https-work-and-why-is-the-padlock-icon-important&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;The small padlock icon in your browser’s address bar isn’t just for decoration. Behind it lies an encryption system that protects your data during transmission. However, you need to know what the icon does and doesn’t mean.&lt;/p&gt;&#xA;&lt;h2 id=&#34;http-vs-https---whats-the-difference&#34;&gt;&#xA;  HTTP vs. HTTPS - what’s the difference?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#http-vs-https---whats-the-difference&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;HTTP&lt;/strong&gt; (HyperText Transfer Protocol) is the web’s basic protocol. This is how your browser communicates with the server when you open a page. Every request and response travels across the network as plain text, without encryption.&#xA;This means that if someone is monitoring the network, for example, on a public Wi-Fi network, they can see exactly what you sent and what you received. Passwords, forms, everything.&lt;/p&gt;</description>
    </item>
    <item>
      <title>What is a VPN actually good for?</title>
      <link>https://exitcode.eu/posts/biztonsag-alapok-9/</link>
      <pubDate>Sun, 15 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://exitcode.eu/posts/biztonsag-alapok-9/</guid>
      <description>&lt;h1 id=&#34;vpn---what-is-it-actually-good-for&#34;&gt;&#xA;  VPN - What is it actually good for?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#vpn---what-is-it-actually-good-for&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;According to VPN providers’ ads, a VPN solves everything: it protects you from hackers, makes you anonymous online, and keeps all your data secure. The reality is more nuanced. A VPN is a useful tool, but only if you know what it’s actually for.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-is-a-vpn&#34;&gt;&#xA;  What is a VPN?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#what-is-a-vpn&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;A VPN (Virtual Private Network) is an encrypted tunnel between your device and a remote server. Traffic passes through this tunnel and exits onto the public internet via the VPN server’s IP address, so the website you visit won’t see your private IP address.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Public Wi-Fi for sensitive matters?</title>
      <link>https://exitcode.eu/posts/biztonsag-alapok-8/</link>
      <pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://exitcode.eu/posts/biztonsag-alapok-8/</guid>
      <description>&lt;h1 id=&#34;why-shouldnt-you-use-public-wi-fi-for-sensitive-matters&#34;&gt;&#xA;  Why shouldn’t you use public Wi-Fi for sensitive matters?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#why-shouldnt-you-use-public-wi-fi-for-sensitive-matters&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;Wi-Fi at cafes, airports, or hotels is convenient, but everyone shares the same public network. This isn’t a problem in and of itself, but under certain circumstances, it poses a serious risk.&lt;/p&gt;&#xA;&lt;h2 id=&#34;whats-the-difference-between-a-home-network-and-a-public-network&#34;&gt;&#xA;  What’s the difference between a home network and a public network?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#whats-the-difference-between-a-home-network-and-a-public-network&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;On your home router, you’re usually the only administrator. You know who’s connecting to the network, and traffic passes through a trusted device.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The impact of data leaks</title>
      <link>https://exitcode.eu/posts/biztonsag-alapok-6/</link>
      <pubDate>Wed, 11 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://exitcode.eu/posts/biztonsag-alapok-6/</guid>
      <description>&lt;h1 id=&#34;what-happens-if-your-account-is-hacked---the-impact-of-data-leaks&#34;&gt;&#xA;  What happens if your account is hacked? - The impact of data leaks&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#what-happens-if-your-account-is-hacked---the-impact-of-data-leaks&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;A data leak doesn&amp;rsquo;t just mean that someone else knows your password. The consequences can spread like a chain reaction. Often, they strike months or years later, when we have long forgotten the original event.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-does-data-get-leaked&#34;&gt;&#xA;  How does data get leaked?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#how-does-data-get-leaked&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;When a website&amp;rsquo;s database is hacked, the user data stored in it is leaked - email addresses, passwords, and possibly personal information. This data is usually:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Two-factor authentication - 2FA</title>
      <link>https://exitcode.eu/posts/biztonsag-alapok-4/</link>
      <pubDate>Mon, 09 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://exitcode.eu/posts/biztonsag-alapok-4/</guid>
      <description>&lt;h1 id=&#34;what-is-two-factor-authentication-2fa-and-why-is-it-important&#34;&gt;&#xA;  What is two-factor authentication (2FA) and why is it important?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#what-is-two-factor-authentication-2fa-and-why-is-it-important&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;Even if someone obtains your password, it should not be enough to gain access. Two-factor authentication provides exactly that - a second barrier that cannot be crossed without knowing the password.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-are-the-two-factors&#34;&gt;&#xA;  What are the two factors?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#what-are-the-two-factors&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;Authentication can be built from three possible components:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Password managers - how do they work?</title>
      <link>https://exitcode.eu/posts/biztonsag-alapok-3/</link>
      <pubDate>Sat, 07 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://exitcode.eu/posts/biztonsag-alapok-3/</guid>
      <description>&lt;h1 id=&#34;password-managers---how-do-they-work-and-why-should-you-trust-them&#34;&gt;&#xA;  Password managers - how do they work and why should you trust them?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#password-managers---how-do-they-work-and-why-should-you-trust-them&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;Previous posts have shown that every account needs a unique, strong password. But who can remember thirty different, random passwords? No one. That&amp;rsquo;s what password managers are for.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-is-a-password-manager&#34;&gt;&#xA;  What is a password manager?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#what-is-a-password-manager&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;A password manager is an encrypted storage device - like a safe where all your passwords are securely locked away. It can be opened with a single &lt;strong&gt;master password&lt;/strong&gt;, and you don&amp;rsquo;t need to remember anything else.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Password reuse</title>
      <link>https://exitcode.eu/posts/biztonsag-alapok-2/</link>
      <pubDate>Fri, 06 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://exitcode.eu/posts/biztonsag-alapok-2/</guid>
      <description>&lt;h1 id=&#34;why-is-it-dangerous-to-use-the-same-password-everywhere&#34;&gt;&#xA;  Why is it dangerous to use the same password everywhere?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#why-is-it-dangerous-to-use-the-same-password-everywhere&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;It&amp;rsquo;s easier to remember one password. That&amp;rsquo;s understandable. But if you use the same password for your banking app, your email, and a forum you haven&amp;rsquo;t visited in a long time, a single data breach is enough to compromise all your accounts.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-is-credential-stuffing&#34;&gt;&#xA;  What is credential stuffing?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#what-is-credential-stuffing&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;When a website is hacked, the leaked username-password pairs quickly end up on the dark web. Attackers use automated programs to try these lists on other sites - this is called &lt;strong&gt;credential stuffing&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Why Password123 Is Never Enough</title>
      <link>https://exitcode.eu/posts/biztonsag-alapok-1/</link>
      <pubDate>Sat, 28 Feb 2026 19:50:39 +0000</pubDate>
      <guid>https://exitcode.eu/posts/biztonsag-alapok-1/</guid>
      <description>&lt;h1 id=&#34;why-password123-is-not-a-good-password&#34;&gt;&#xA;  Why &amp;ldquo;Password123&amp;rdquo; Is Not a Good Password&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#why-password123-is-not-a-good-password&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;Many people use simple passwords because they are easy to remember. That is understandable - but unfortunately it is a serious risk. In this article you will learn what happens behind the scenes, how to choose a strong password, and a method that makes strong passwords actually memorable.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-are-passwords-cracked&#34;&gt;&#xA;  How Are Passwords Cracked?&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#how-are-passwords-cracked&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;Attackers do not need to guess your password. Instead, they use programs that automatically try &lt;strong&gt;millions of combinations per second&lt;/strong&gt;. This method is called a &lt;strong&gt;brute force&lt;/strong&gt; attack.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
