From e545071eef837bd123f362420db9c067e7d03272 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ra=C3=BAl=20Pirac=C3=A9s?= <83690943+rpiraces-plain@users.noreply.github.com> Date: Tue, 14 Nov 2023 09:20:58 +0100 Subject: [PATCH] chore: Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index de0d6e4..e038f78 100644 --- a/README.md +++ b/README.md @@ -494,7 +494,7 @@ Therefore, if we want to "randomize" those requests, so an attacker can not simp Check the folder `./csrf` to play around with the demo and discover how to implement these tokens. ## Hashes -[![Colab](https://colab.research.google.com/assets/colab-badge.svg)](https://colab.research.google.com/github/jakevdp/PythonDataScienceHandbook/blob/master/notebooks/Index.ipynb) +[![Colab](https://colab.research.google.com/assets/colab-badge.svg)](https://colab.research.google.com/github/rpiraces-plain/security-development-muggles/blob/main/hashes/src/Hashes_salt.ipynb) **Video:** [explanation demo](https://youtu.be/gZcEUoHG8fk).