Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in security

What are the risks of cross domain JSONP communication?

jquery security jsonp xss

Is a random string a good verification code

How Should I Secure a SQLite Database in iOS?

CSRF token for ajax

java keystore and password settings

Reliability of Mimetypes in Uploads (PHP)

How to crack a dBase file password?

How to create a bidirectional encrypted stream on top of an underlying .NET Stream?

.net security cryptography

OAuth token security

security oauth access-token

how to secure dll functions from being used outside of my application?

modify per-application access control for private key via command line?

Transmit user password for a rest api

php security rest web

Can a GIF/JPEG file contain runnable PHP code?

php security gif

Complex Righty System: ACL, RBAC and more what?

How to avoid injection for sorting query by runtime value

sql security orm coldfusion

Homoglyph attack detection in email phishing

Working against a Secure-Channel with Security-Exit using XMS .NET API

c# security ibm-mq xms

Is AWS, specifically the load balancer service affected by SSL "Heart Bleed" exploit? [closed]

Ruby - unsupported cipher algorithm (AES-256-GCM)

Can we force perl always use three argument form of open when running from command line?

perl security