Skip to main content
The 2024 Developer Survey results are live! See the results

Explore our questions

4 votes
3 answers
3k views

If my old device is infected, can my new device get viruses from my social media accounts?

0 votes
0 answers
104 views

What are the effective open-source methods for storing and managing encryption keys in a language-agnostic manner when an HSM is unavailable?

1 vote
1 answer
53 views

How to limit the Wireless CA can only use in wireless connection on Windows?

3 votes
2 answers
146 views

How can there be incoming connections when using a VPN?

6 votes
1 answer
2k views

Pivoting with Metasploit

1 vote
1 answer
176 views

What is the easiest way to implement a "passthrough" to let a device bypass the header requirement of an API which we both own?

0 votes
0 answers
19 views

Securing Transactional Email: User Input Escaping for a email subject

3 votes
1 answer
953 views

Tomcat 7 and ETags

5 votes
2 answers
4k views

Can trusted timestamping be faked by altering some bytes within the document?

0 votes
2 answers
22 views

Should an HTTP error 500 triggered by an XSS payload be reported as a potential vulnerability?

0 votes
1 answer
403 views

keys.openpgp.org keyserver fails to send confirmation mail to an Outlook-address

1 vote
0 answers
28 views

How to scan and sanitize STL files?

1 vote
0 answers
63 views

Why can I cat a file I can't find?

0 votes
1 answer
282 views

Spam investigation and email reputation check

Browse more Questions