Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in security

Exploitable Python Functions [closed]

python security auditing

Should application users be database users?

Hacking and exploiting - How do you deal with any security holes you find?

security exploit

Is a POST from HTTP to HTTPS secure?

https security

How to generate a secure random alphanumeric string in Java efficiently?

Implementing and Testing iOS data protection

How to protect against direct access to images?

Prevent user to find password through Firebug/Chrome Dev Tools

randomBytes vs pseudoRandomBytes

node.js security

What is the best and safest way to store user email addresses in the database? [closed]

email encryption security

When a TrustManagerFactory is not a TrustManagerFactory (Java)

java security ssl junit pkix

bouncycastle + JBoss AS7: JCE cannot authenticate the provider BC

How do I use Apple Keychain?

Characters to avoid in automatically generated passwords

How to remove x-powered-by header in .net core 2.0

c# azure security

How to restrict folder access in asp.net

asp.net security

When the bots attack! [closed]

Hows does one prevent passwords and other sensitive information from appearing in an ASP.NET dump?

What are some viable techniques for combining CSRF protection with RESTful APIs?

How to create and store password hashes with Blowfish in PHP