Skip to main content
bethlakshmi's user avatar
bethlakshmi's user avatar
bethlakshmi's user avatar
bethlakshmi
  • Member for 13 years, 6 months
  • Last seen more than 1 year ago
73 votes
Accepted

Are password-protected ZIP files secure?

61 votes

What are the differences between MD5, SHA and RSA?

46 votes

Somebody bumped into me, next day my storage unit was burglarized

42 votes

How does the digital signature verification process work?

35 votes

Certificate based authentication vs Username and Password authentication

23 votes
Accepted

What happens when an Intermediate CA is revoked?

22 votes
Accepted

How to make a report after a ddos attack? what information do I need to write on the report?

20 votes
Accepted

Secure communication between applications using SSL Certificates

20 votes
Accepted

when to use nonce?

19 votes
Accepted

I see entry level security skills as a problem for industry - what can we do about it?

19 votes

How do you manage security-related OCD (i.e. paranoia)?

16 votes

Why do some people really hate security via client-side?

16 votes
Accepted

How to protect off-the-shelf web applications?

15 votes

Security of passphrase-protected private key

14 votes
Accepted

Question of importance of FIPS in security implementations

13 votes

Is it safe to use virtual machines when examining malware?

12 votes
Accepted

Why are Certificate Revocation List periodically renewed?

12 votes

SSL/TLS - Distinction between self-signed cert and self-signed CA, and other questions?

12 votes
Accepted

How do you compare risks from your websites, physical perimeter, staff etc

12 votes
Accepted

Biometric versus other Two Factor Authentication Mechanisms

12 votes
Accepted

Securing my web-server / website

12 votes
Accepted

How do I secure my login page?

11 votes
Accepted

Security Concerns on clientside(Javascript)

11 votes
Accepted

Should the bit-strength selection of a child certificate be influenced by the CA or the chain?

11 votes
Accepted

Using Private Browsing mode while connected to organization's network

10 votes
Accepted

Obtaining an S/MIME certificate without disclosing my private key to the TTP

10 votes
Accepted

Why is there a minimum username length?

10 votes
Accepted

How do I respond to a published security vulnerability in my application?

10 votes

How to secure identity after someone dies?

10 votes

Why is it always `HASH( salt + password )` that we recommend?

1
2 3 4 5