Questions
Linux
Laravel
Mysql
Ubuntu
Git
Menu
HTML
CSS
JAVASCRIPT
SQL
PYTHON
PHP
BOOTSTRAP
JAVA
JQUERY
R
React
Kotlin
×
Linux
Laravel
Mysql
Ubuntu
Git
New posts in security
Why do salts make dictionary attacks 'impossible'?
Oct 23, 2022
security
hash
salt
dictionary-attack
Algid parse error, not a sequence
Oct 16, 2022
java
security
rsa
C - The %x format specifier
Feb 27, 2019
c
string
security
format
How to secure RESTful web services?
Oct 26, 2019
web-services
security
rest
oauth
restful-authentication
How can I protect MySQL username and password from decompiling?
Aug 17, 2022
java
mysql
security
reverse-engineering
decompiling
Generating cryptographically secure tokens
Aug 17, 2022
php
security
openssl
token
How to enable DDoS protection?
Aug 17, 2022
php
security
ddos
denial-of-service
Are JSON web services vulnerable to CSRF attacks?
Aug 17, 2022
http
security
csrf
Why is there no same-origin policy for WebSockets? Why can I connect to ws://localhost?
Aug 17, 2022
javascript
security
websocket
Random number in range [min - max] using PHP
Aug 17, 2022
php
security
random
How to validate domain credentials?
Aug 17, 2022
c#
windows
security
authentication
What command do I use to see what the ECDSA key fingerprint of my server is?
Aug 17, 2022
linux
security
ssh
rsa
openssh
Is it safe to trust $_SERVER['REMOTE_ADDR']?
Aug 17, 2022
php
security
ip-address
Non-random salt for password hashes
Sep 25, 2022
security
authentication
hash
cryptography
password-protection
What security mechanisms does Meteor have? [closed]
Feb 12, 2022
mongodb
security
meteor
How do you protect your software from illegal distribution? [closed]
Oct 24, 2022
security
licensing
protection
software-distribution
piracy
What does it mean to escape a string?
Aug 17, 2022
php
mysql
security
escaping
iOS 11: ATS (App Transport Security) no longer accepts custom anchor certs?
Sep 13, 2021
security
ssl
ios11
xcode9
GPG vs SSH keys
Sep 14, 2022
security
github
ssh
ssh-keys
gnupg
How does the JPEG of Death vulnerability operate?
Aug 05, 2019
c++
security
memcpy
malware
« Newer Entries
Older Entries »