You can use shift-click to select all checkboxes in between.
  • U: Anonymous
  • D: 2022-03-16 11:51:05
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 UDUMMY File size CRC
Download
13,007
Stored files
3,357 BD3B762D
580 6BFE144F
RAR-files
udemy.the.nuts.and.bolts.of.oauth.20-udummy.rar 400,000,000 D56B72AC
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r00 400,000,000 A9BEED3C
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r01 400,000,000 EF9B4A03
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r02 400,000,000 3F74ADB8
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r03 400,000,000 0E047EA9
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r04 400,000,000 47416DFC
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r05 400,000,000 648A2573
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r06 400,000,000 655EFAB0
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r07 400,000,000 AB9D63BF
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r08 356,779,257 1F4078E0

Total size: 3,956,779,257
Archived files
01-Intro_to_this_Course.mkv [f23ef9ccf391ceaa] 51,847,766 099ED243
41-Contextually_Choosing_Token_Lifetimes.mkv [c8244c3423bbf152] 111,175,965 1EE22DA5
20-Protecting_Tokens_in_the_Browser.mkv [d9475c6ca1bcb66] 63,681,015 DFF44551
03-How_OAuth_Improves_Application_Security.mkv [878c5253dbec314e] 62,749,753 F585E820
32-Reference_Tokens_vs_Self-Encoded_Tokens.mkv [8ea3fe1dc6b472a1] 164,999,894 6FD436C5
27-How_ID_Tokens_are_Different_from_Access_Tokens.mkv [27fcd4fb11fa655a] 50,702,225 79FE937F
17-Refresh_Tokens_for_Native_Apps.mkv [4f153c5a31b280e8] 49,008,899 0BB1A56F
43-The_Problem_with_Local_Validation.mkv [2710eba2f399fb2c] 98,319,537 7E8730F9
34-Pros_and_Cons_of_Self-Encoded_Tokens.mkv [e0da3dbef3dcb2f9] 115,521,498 8B5D34DB
26-What_is_an_ID_Token.mkv [7b9a7befefd84281] 29,880,053 4B7AE8F1
39-Increasing_Security_with_Short_Token_Lifetimes.mkv [426ddffef2761064] 50,014,162 A4110D00
06-Application_Types.mkv [ec7a09baac271efb] 55,981,694 73D487B4
46-The_Purpose_of_OAuth_Scopes.mkv [4cfd22cc9719280f] 30,491,927 9940E69C
47-Defining_Scopes_for_your_API.mkv [23e224255112bada] 110,638,901 0D77686D
49-The_Future_of_OAuth_OAuth_2.1.mkv [7847e76a77655099] 71,731,832 F6FBC2A5
05-Roles_in_OAuth.mkv [42f9bc79fadb2549] 42,939,100 388BB67A
08-Front_Channel_vs_Back_Channel.mkv [8306b85221aea3fb] 72,597,255 8AA89B08
04-OAuth_vs_OpenID_Connect.mkv [b71f75fed7c274dd] 50,727,466 1D169C25
12-Authorization_Code_Flow_for_Web_Applications.mkv [bad9b7b3d228091f] 79,285,341 4AF8B462
16-Authorization_Code_Flow_for_Native_Apps.mkv [42bbad8b9345f685] 85,883,514 A685ADDB
25-Client_Credentials_Grant_for_Machine-to-Machine_Applications.mkv [cd2e05b3921eb4c3] 23,934,624 9F1BB601
44-Token_Lifetime_Considerations.mkv [2a57152c7aca097b] 18,237,267 DF44E22A
45-How_Applications_can_Revoke_Access_Tokens.mkv [69e5c3ac1226bb09] 55,226,904 67D1FDBC
24-When_to_use_the_Client_Credentials_Grant.mkv [cee55fde08a5b7a7] 21,460,785 62502FD1
18-Problems_with_the_Browser_Environment.mkv [72b096fe82e2dbb1] 55,186,911 9142EAE8
31-Intro_to_Protecting_an_API_with_OAuth.mkv [b41d19b6f81fd31a] 30,384,394 63163C77
35-The_Structure_of_a_JWT_Access_Token.mkv [b6092d8f1d72d1a1] 256,294,762 0938CFA1
19-Authorization_Code_Flow_for_Single-Page_Applications.mkv [b0bc77c7f6927914] 80,257,993 C7729A09
30-Validating_and_Using_an_ID_Token.mkv [fea7d83249c74102] 152,445,369 C3C0EEA1
14-Redirect_URLs_for_Native_Apps.mkv [44b1de6eacb285ae] 42,850,679 C8B7B56B
36-Remote_Token_Introspection.mkv [2336ee72723a8935] 109,973,893 243E3B09
02-A_Brief_History_of_OAuth.mkv [f53d182a0361667a] 41,708,358 D3918BC0
21-Securing_the_Browser_with_a_Backend.mkv [178a9062110c481c] 61,075,167 7DB0AD1B
38-The_Best_of_Both_Worlds_Using_an_API_Gateway.mkv [ffbbaaa74de61d81] 96,179,871 5862A514
42-Reasons_Why_an_Access_Token_May_become_Invalidated.mkv [2a0dc1c8d001b0c6] 81,199,451 EDCCDB4F
22-Limitations_of_IoT_and_Smarthome_Devices.mkv [3cfab2281880a330] 89,553,761 CC471EA0
48-Prompting_the_User_for_Consent.mkv [54e24eae56565720] 67,545,456 0ECF1599
11-Registering_an_Application.mkv [785e9d5f99bea1d7] 49,961,802 8A87618F
10-Introduction_to_OAuth_Clients.mkv [3ef1ce8cf5458f09] 15,992,417 9EF62583
40-Improving_User_Experience_with_Long_Token_Lifetimes.mkv [12abba40ee2f2f4c] 92,054,216 E84F392C
29-Hybrid_OpenID_Connect_Flows.mkv [e021f7e7bb6b0521] 106,219,535 A8FB735C
51-Thank_You_for_Taking_the_Course.mkv [93d9eb64eb675256] 15,053,717 D410F567
23-Device_Flow_for_Browserless_Devices.mkv [c5ca9338430e4b18] 26,662,513 9ECDA330
28-Obtaining_an_ID_Token.mkv [2bf1ff89d1436ce7] 127,877,220 09FF09D0
33-Pros_and_Cons_of_Reference_Tokens.mkv [ef06601dfc38502a] 90,508,115 F57FF6F4
07-User_Consent.mkv [b964f5959e1b82d9] 135,781,523 287DBB39
13-The_Unique_Issues_of_Native_Apps.mkv [484cf0ab2a1f5ebf] 14,115,566 31D007EE
09-Application_Identity.mkv [4cf1e97f429de4cd] 167,701,900 7F831C4B
37-Local_Token_Validation.mkv [21cc85ce8a3c735a] 313,039,444 FB33A922
15-Browser_Security_for_Native_Apps.mkv [563f296366450ff4] 50,926,666 5AC7F1BA
50-Additional_Resources_and_Further_Reading.mkv [4ed082ef8a8a53f3] 19,186,129 5998784E

Total size: 3,956,774,205
RAR Recovery
Not Present
Labels UNKNOWN