Skip to main content
AviD's user avatar
AviD's user avatar
AviD's user avatar
AviD
Moderator
  • Member for 13 years, 8 months
  • Last seen more than a month ago
943 votes
11 answers
328k views

How to securely hash passwords?

168 votes
3 answers
88k views

What are rainbow tables and how are they used?

77 votes
1 answer
71k views

What is the difference between RBAC and DAC/ACL?

48 votes
2 answers
16k views

Criteria for Selecting an HSM

35 votes
6 answers
10k views

Does it matter which Certificate Authority I source my SSL Certificate from?

32 votes
3 answers
34k views

Authenticating a Proxy server over HTTPS

22 votes
3 answers
907 views

Startup security

22 votes
3 answers
6k views

White-box vs. Black-box

19 votes
6 answers
6k views

Automated tools vs. Manual reviews

19 votes
4 answers
10k views

What tools are there to inspect Flash SWF files?

17 votes
3 answers
4k views

Multi-tenancy, SSL Certificates, and Subject Alternative Name

16 votes
2 answers
2k views

How can I test my web application for timing attacks?

16 votes
5 answers
48k views

Multiple VPN clients in parallel

15 votes
8 answers
19k views

Secure memcpy for pure C

14 votes
3 answers
654 views

What risk analysis methodologies should I use?

14 votes
4 answers
311 views

Is external vuln scanning sufficient?

12 votes
3 answers
9k views

Is null-byte injection possible in Java filenames?

11 votes
8 answers
1k views

iPhone Tracking debacle - risks and countermeasures

10 votes
2 answers
333 views

Cloud-specific standards and regulations

9 votes
2 answers
718 views

Backup schedule for Encryption Keys

7 votes
1 answer
2k views

Hadoop security, isolation, and hardening

7 votes
4 answers
8k views

Does default ModSecurity protect enough against XSS?

7 votes
8 answers
579 views

Topics for SecureCoding course in C

7 votes
2 answers
653 views

What key metrics should a CIO rely on to gauge the extent of IT risk exposure?

6 votes
2 answers
3k views

FrameBusting script

5 votes
4 answers
1k views

What issues are most important to cover in Corporate Security Policy?

5 votes
2 answers
2k views

How does OWASP ESAPI protect against direct object reference vulnerabilities?

2 votes
1 answer
3k views

Buffer Overflow on Raspberry PI

1 vote
2 answers
809 views

AntiXSS for ASP.NET 1.1