Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in security

Is it possible to write a wifi cracking util for Android phones? Monitor mode vs Multicast?

What is the best method to dynamically sandbox inline JavaScript?

Protect iPhone app from hackers

iphone objective-c security

Creating a SQL Server user with permission to read one view and nothing else - but he can see system views and procedures?

Secure information contained on iPhone SQLite DB

Website script injection scan [closed]

javascript security web xss

SQL & ColdFusion Encryption

security concerns around storing user data on Google App Engine

Oracle padding exploit - how does it download the web.config?

How can ASLR be effective?

security aslr

Why does fireshepard kill firesheep?

security exploit

How secure is it to call Amazon S3 Services from an iPhone?

iphone security amazon-s3

Is there such a thing as the "Tamper Data firefox plugin" for chrome? [duplicate]

Is it possible to programmatically authenticate with Spring Security and make it persistent?

Is disabling CSRF protection sometimes justified?

Security Features in Android

android security

What are the risks of having secure=false in a crossdomain.xml

flash security cross-domain

Is there any need to sanitize a $_POST value before using it in a PHP header (for redirecting)

How to sign data with .p12 file in Java?

java security applet rsa pkcs#12

What does it take to write a PCI compliant assembly?