Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in security

How to grant different permissions to various Java classes?

Detecting and controlling unauthorized shared memory reads

what does this security warning mean (.Net Process class)?

Preventing MITM attacks on server

Windows Identity framework with windows XP

does it make sense to send password information during email communication from websites

What are the pros and cons of specifying a Controller class via URL vs. having a script for each Controller?

php security theory

Impact of Microsoft Security Advisory (2269637) on .NET coding

Difference between CRC and hash method (MD5, SHA1)

security hash md5 crc crc32

POST data encryption - Is HTTPS enough?

php post https security ssl

How is the modified return address in a stack based buffer overflow attack approximated?

Best + Strongest method of encryption for databases [closed]

protecting against CSRF on ajax requests and forms without submit buttons

ajax security token csrf

Secure MVC4 c# webapi so that only my app can access it

Django/Auth: Can request.user be exploited and point to other user?

Sanitizing string to prevent relative URI paths

Secure Node.js chat (avoid XSS)

Reading HttpResponseMessage.Content throws Newtonsoft.Json.JsonReaderException when reading webapi 2 token

Possible to access a function on a parent page from an iframe that is on a different subdomain?

Do format string vulnerabilities exist in C# or Java?

security