Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in security

Is it ethical to monitor users? [closed]

How to figure out a reasonable content security policy source for nginx (virtual hosts)?

Stored Procedures vs No Stored Procedures - Security Viewpoint

Default kSecAttrAccessible value for keychain items?

How can I allow my user to insert HTML code, without risks? (not only technical risks)

php javascript html security xss

Is the salt contained in a phpass hash or do you need to salt its input?

php security hash phpass

How to add X-Content-Type-Options to tomcat configuration

Remove All Directory Permissions

c# .net security permissions

How to secure EmberJS or any Javascript MVC framework?

Adding X-CSRF-Token header globally to all instances of XMLHttpRequest();

Irretrievably destroying data in Java

java security

Algorithm to avoid SQL injection on MSSQL Server from C# code?

c# .net sql-server security

Why does PHP crypt() prepend the salt to the hash?

php security encryption hash

Do the access levels and modifiers (private, sealed, etc) serve a security purpose in C#?

c# security sealed

Android permissions: How can I learn which are dangerous vs normal?

Do similar passwords have similar hashes?

what does this script do? - hacked site

javascript security

Cheating in online games: Is it possible to prevent one Win32 process from inspecting/manipulating another's memory?

c++ security winapi

How safe is it to send a plain text password using AJAX?

How can I create a password?

java security random passwords