Why do best practices recommend against adding your own pepper to passwords before hashing?

According to my research, if you want to store passwords securely, you should use built-in hash functions that have been vetted by the professionals. Best practices recommend that you do not add a hard-coded pepper.
But why not?
Let’s say:… Continue reading Why do best practices recommend against adding your own pepper to passwords before hashing?

Question about storing salt values and hashed passwords in the database [duplicate]

So I was reading through an article about how passwords are salted and hashed through a cryptographic function here, and found out that hashed passwords, along with the plaintext salt values are stored in the database.
Now, I was wondering… Continue reading Question about storing salt values and hashed passwords in the database [duplicate]

.exe with Digital Signature, showing SHA1 but the Certificate is SHA384, is it secure?

For this file it shows SHA1:

But going into details the certificate looks like this:

I know SHA1 is an outdated algorithm but I’m not sure about this nested construction. Is this insecure? Which of the two parts matter, does it matter th… Continue reading .exe with Digital Signature, showing SHA1 but the Certificate is SHA384, is it secure?