What does a tool maker do when his tool breaks? He builds a new tool to patch the broken one. At least that is what David Beckemeyer (Mr Blog) did when his tweeting garage door opener was threatened by the approaching OAuthpocalypse. This date with destiny for all Twitter programmers is the planned June 30th cutoff of basic authentication. At that point all Twitter apps must communicate with the API through OAuth authentication instead of the much less complicated user name/password form of HTTP Authentication. There are many good reasons for this change, which have been repeated endlessly on the Twitter developer forum, but in practice it is a lot of added complexity, more complexity than David wanted to build into his little, simple garage door device.
||Passable API is a free, lightweight, RESTful web service that developers can easily implement to prevent password hacking and breaches. Developers can send the hash of the password and its...||Security||04.20.2016|
Threat Stack Webhook
||Threat Stack Webhook API is a cloud-based security solution that enhances the speed and synchrony of apps that resolve cross-platform events. Users can customize its configurations to automatically...||Cloud||04.20.2016|
||The Gophish API integrates simulated phishing campaign features into applications. Developers can set template and targets, launch a campaign, and measure results. JSON format and Key authentication...||Open Source||04.20.2016|
||Tozny is an authentication platform that uses cellphones as unique identifiers. This platform can be used as a strong cryptography layer for financial services or to eliminate the need of passwords...||Security||04.18.2016|
||The InstaUnite API allows customers to integrate remote fleet, asset...||Management||04.11.2016|