Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in security

What are the prevention techniques for the Buffer overflow attacks?

Is a stack overflow a security hole?

Secure C coding practices

c security secure-coding

Could a web-scraper get around a good throttle protection?

security http web-scraping

Is email address validation really needed to validate new users?

Secure Token URL - How secure is it? Proxy authentication as alternative?

security http hash token

How to avoid using membership provider?

Is regenerating the session ID after successful login sufficient to prevent session fixation?

php security session

buffer overflow example from Art of Exploitation book

Is Ruby's seed for OpenSSL::Random sufficient?

Why sign Git tags?

git security gnupg git-tag

Pyramid.security questions: Double cookies? Insecure cookies? Expiration?

How can you test that an SSL client library is properly verifying the certificate of the server to which it connects?

Github pages with custom CNAME security

Security risks of setting trustworthy = on in sql server 2012

Why is using '*' as the targetOrigin for postMessage a security risk?

Is there any way to make user uploaded SVG images safe from code injection etc?

Deny all files in a directory, via web.config setting

asp.net security web-config

This document requires 'TrustedScriptURL' assignment

Can we hack a site that just stores the username as a session variable?

php security login