Tonimir Kisasondi
Tonimir Kisasondi
1) Dump linkcrawl output to a file. 2) Run linkcrawl on the output with the help of cat and xargs. :)
+1, would love to see this feature.
Under 0x10-V1-Architecture under V1.6 Cryptographic Architecture i considered adding something like: "Verify that all selected cryptographic systems, protocols, algorithms or modes of operation are appropriate for the application's threat model...
Thanks for the feedback! I would suggest that we don't specify algorithms or modes, but focus on the result we want to achieve. And the only way for anyone who...
Awesome, thank you!