Top new questions this week:
|
Since I am a decent fan of the XKCD no 936 (or actually conclusions and implications it brings), I wanted to test (using try zxcvbn) the complexity and the possiblity of breaking a password like the …
|
When there’s a Youtube video embedded on a site that I visit while I am logged in Youtube beforehand,how does the embedded video know that it’s me so I can add it to my Watch Later list? I think the …
|
During our Red/Blue team practice my friend made a web forum application where people can post message. What he did was filtering: The equal sign The key words: “javascript”, “alert&…
|
As part of a project for school I’ve been tasked with designing a secure application that should be able to upload and download files from a database. I have very little experience in the area of …
|
I have a false positive involving the content of one of my cookies: ModSecurity: Warning. Matched “Operator `PmFromFile’ with parameter `lfi-os-files.data’ against variable `REQUEST_COOKIES:xid’ (…
|
Based on existing answers, I found out that viruses can “hide” in a video by exploiting the software/libraries used to open the video, say ffmpeg. But my question is: If a video contains …
|
Requested our operations partner to configure TLS for Db2 on z/os. All fine when using OpenSSL version 1.x to verify, but it just won’t happen when using openssl version 3.x, and I’m not able to …
|
Greatest hits from previous weeks:
|
If I use the following openssl req -x509 -days 365 -newkey rsa:2048 -keyout private.pem -out public.pem -nodes I get private.pem and public.pem If I use ssh-keygen -t rsa -f rsa I get rsa and …
|
What methods are available for testing SQL injection vulnerabilities?
|
I have been getting emails from “account-security-noreply@accountprotection.microsoft.com” (as verified in metadata) about unusual activity. The internet has very conflicting information about if …
|
This is an attempt at a canonical question following this discussion on Meta. The aim is to produce basic answers that can be understood by the general audience. Let’s say I browse the web and use …
|
My email-provider’s website (www.gmx.de) recently started linking to the (German) site www.browsersicherheit.info/ which basically claims that due to its capabilities to modify a site’s …
|
I log on to my works wifi throughout the the day whilst at work, I use apps like WhatsApp and iMessages to communicate when I need to, can my employer see the content of those messages (actually read …
|
On some accounts I use my real name on-line (Google+/Facebook/Wikipedia/personal blog), others (Q&A/Gaming) I use an alias. My question is: Security and privacy wise, what can people do with my …
|
Can you answer these questions?
|
Let’s say I’m building a web application (let’s focus on the backend side) that is B2C. Users should be able to register with my application, using a SSO provider like Google or Facebook. Once they’re …
|
At my work email, which is handled by MS Office 365 Outlook, I keep getting phishing emails, typically 3 times a week, usually with some attachment “your company’s monthly financial report” …
|
I am using the following line of code to create a reset password code sent to the user in her/his email. when scanned with brakeman to my ruby code, this line of code is catched and describes it as it …
|