Skip to main content
Adi's user avatar
Adi's user avatar
Adi's user avatar
Adi
  • Member for 11 years, 8 months
  • Last seen more than 2 years ago
339 votes
Accepted

What's the rationale behind Ctrl-Alt-Del for login

210 votes
Accepted

What is the difference between https://google.com and https://encrypted.google.com?

117 votes
Accepted

Is it dangerous to post my MAC address publicly?

105 votes
Accepted

Why am I allowed to access protected Windows files when I boot Ubuntu from USB?

98 votes
Accepted

Is using 'dot' and 'at' in email addresses in public text still useful?

90 votes
Accepted

Prevent my site from being copied

85 votes
Accepted

Should we protect web application source code from being stolen by web hosts through obfuscation?

83 votes
Accepted

I found obfuscated code in a comment on my blog. What should I do?

83 votes
Accepted

How can you be caught using Private VPN when there's no logs about who you are?

74 votes
Accepted

What can an attacker do with Bluetooth and how should it be mitigated?

60 votes
Accepted

What is the difference between Promiscuous and Monitor Mode in Wireless Networks?

60 votes
Accepted

PHP files browsable: is this a vulnerability?

58 votes
Accepted

Why can a Tor exit node decrypt data, but not the entry node?

55 votes
Accepted

How secure is Java's hashCode()?

55 votes
Accepted

Does WinRAR leave traces of temporarily extracted files?

55 votes
Accepted

Is Clickjacking a real security vulnerability?

52 votes
Accepted

Is it okay to reveal database's table names?

48 votes

You're an IT consultant. Should you discourage a client from telling you their password?

47 votes

Changing picture as characters entered into password

47 votes

What to do when I found a spyware that my spouse has installed?

46 votes
Accepted

Should I use FileZilla?

46 votes
Accepted

Why would the BBC web site always ask for a personal certificate, and how do I avoid giving it away?

44 votes
Accepted

What are the security implications of enabling UPnP in my home router?

44 votes

Use additional "password" in Referer to hide private site?

40 votes

Touch Screen Password Guessing by Fingerprint Trace

39 votes

Do we need to logout of webapps?

39 votes

How can I prevent that my users get a certificate issued for my domain on my behalf?

37 votes
Accepted

Why does PGP use symmetric encryption and RSA?

34 votes
Accepted

How do some sites detect AdBlock Plus?

34 votes
Accepted

Is Torrent safe for sharing legitimate files (file verification)? Does it use SHA1 or SHA256?

1
2 3 4 5
11