Skip to main content
Mike Samuel's user avatar
Mike Samuel's user avatar
Mike Samuel's user avatar
Mike Samuel
  • Member for 13 years, 8 months
  • Last seen more than a month ago
28 votes

Who is responsible for the strength of user's passwords?

18 votes

Authenticating without a database

13 votes
Accepted

What is the danger of Reflected Cross Site Scripting?

11 votes

When is it appropriate to SSL Encrypt Database connections?

10 votes

Is this much distrust really necessary?

10 votes

What steps do Gmail, Yahoo! Mail, and Hotmail take to prevent eavesdropping on email?

10 votes
Accepted

Are the iPhone "connect the dots" passwords secure?

10 votes

At what point does "hacking" become illegal? (US)

10 votes

What to add to a repeating security checklist?

10 votes

Google hacking - why "numrange" is so dangerous?

9 votes
Accepted

Risks of Using Google Native Client

9 votes

Open Problems in Security?

8 votes

Why should I restrict the content type of files be uploaded to my site?

8 votes

What file formats are known to be unsafe?

8 votes
Accepted

XSS inside CSS when " is encoded?

7 votes

When registering for most websites, why do you need to confirm your email address?

7 votes

Does an established HTTPS connection mean a line is really secure?

7 votes
Accepted

Need an overview of web service / web site security world, where do I start?

6 votes

How to disclose a security vulnerability in an ethical fashion?

6 votes

IT Security Learning Path

6 votes

Escaping JavaScript constants

6 votes

Solution to allow JavaScript input but prevent XSS

6 votes
Accepted

WebServices Security

6 votes

How to verify that someone is who they say they are online?

6 votes

My company policy states I must put all passwords in a password safe shared with management. Is this secure?

5 votes

How do I log everything a certain program is doing?

5 votes

Are SSL certificates from a CA necessary for secure communication?

5 votes

What are the pros and cons of site wide SSL (https)?

4 votes

How to improve as a security expert

4 votes

Is it possible to forge a post request?