Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in security

MySQL "INSERT" and SQL injection

Purpose of using permitAll() in PreAuthorize annotation in Spring Security

Is secure to use a md5 hash as registering string token?

Is storing aws cognito JWT key in frontend javascript insecure?

j_security_check and JAAS

Unlinked web pages on a server - security hole?

html security

Is it possible to write malware that runs on .NET?

c# .net vb.net security

Accessing private static methods from a public static context

java security oop constraints

Prevent query string manipulation by adding a hash?

How do I limit the size of a Net::HTTP request?

ruby-on-rails ruby security

What's the point in providing an MD5 or SHA1 hash along with a downloadable executable?

md5 hash security sha1

Is It Possible To Reconstruct a Cryptographic Hash's Key

security encryption

Should a web page with a login form be secured?

security

avoid session hijacking for Web Applications

Is it a bad idea to automatically log users in from an email?

What steps can be taken to ensure the security of a PHP application?

php security

what is the vulnerability of having Jsessionid on first request only

security jsessionid

Create a security identifier for the current domain

c# windows security

php sessions security query

What are all the security measures I should check over before deploying my Rails application?