This list is written in no particular order :)
This links to a blog post that illustrates the importance of (ssh) key rotation.
SHA-1 is very old at this point and most vendors are stopping to accept it. SHA-3 is the successor to SHA-2 which itself is the successor to SHA-1. This link explains why arent SHA-3 common now.
This links to a Computerphile Youtube video with Prof. Brian Kernighan which tells the story how he came to write the K&R book.
This links to a github repo of a script collection that simplify the setup of a VPN. This really simplifies the steps to have our own secure VPN.
I was confused about ‘pgp’ and ‘gpg’ and this blog post explains a lot on how it all came to be.
This is a link to the a chapter of the online Pro Git Book by Scott Chacon and Ben Straub. This chapter describes the use of git submodules, that is a git repository as a subdirectory of another git repository. Git submodules are pretty interesting, they can be use in multitudes of way such as automatically updating relevant libraries or making a central repo for deployments.
Google Chrome is finally blocking third-party cookies. This is really a good step forward for a more private internet.
This may be only tangentially related to the current topic but JSON Web Key is a pretty nifty standard that now underpins a good chunk of authentication on the web given that many websites are now using JSON Web Tokens.
Hardware authentication devices are interesting things and I have always wanted one. They are really necessary for truly secure systems.
It is simply a sin to not include K&R when discussing C references. Therefore, the above links to a listing for the book, the OG book for C.