Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in security

How does the JPEG of Death vulnerability operate?

c++ security memcpy malware

Difference between SSL & TLS

security ssl

Is it safe to put a jwt into the url as a query parameter of a GET request?

security http jwt

How to hash long passwords (>72 characters) with blowfish

What are best practices for securing the admin section of a website? [closed]

security authentication

Techniques for obscuring sensitive strings in C++

What is the difference between CORS and CSPs?

security web cross-site

How to Export Certificate from Chrome on a Mac?

The EXECUTE permission is denied on the user-defined table types?

Securely storing passwords for use in python script [duplicate]

python security

Which $_SERVER variables are safe?

php security

How do you set up use HttpOnly cookies in PHP

How permission can be checked at runtime without throwing SecurityException?

https URL with token parameter : how secure is it?

security url https token

SSL and man-in-the-middle misunderstanding

Is there a difference between authentication and authorization?

security

best practice to generate random token for forgot password

client secret in OAuth 2.0

What's the right OAuth 2.0 flow for a mobile app

security mobile oauth-2.0

How to limit setAccessible to only "legitimate" uses?

java security reflection