Skip to main content
StrangeWill's user avatar
StrangeWill's user avatar
StrangeWill's user avatar
StrangeWill
  • Member for 12 years, 9 months
  • Last seen more than 1 year ago
13 votes

Should a web application return true http errors?

13 votes
Accepted

How is my website vulnerable for sql injections?

12 votes
Accepted

Linux or Windows- the security issue

11 votes

Should passwords be revealed in error message?

10 votes

Can I use a private key as a public key and vice versa?

9 votes

Security implications of rooting Android

8 votes
Accepted

GPU powered Password cracking machine - buy metal or cloud?

7 votes

Is my bank storing my password in plain text?

5 votes

Is storing card details without the permission of the card holder against PCI DSS?

5 votes

Is AES encrypting a password with itself more secure than SHA1?

5 votes
Accepted

What flaws lie behind HttpContext.Current object i .NET?

5 votes

How quickly can these password schemes really be beaten?

4 votes

What utilities exist to brute force a username and password?

4 votes

Allow apache to write to users' .ssh dir's

4 votes

Reflector - obfuscated code

3 votes

How can I remotely wipe the contents of a Linux Laptop if its been stolen?

3 votes

Without using SSL, what's the most secure way to make an AJAX request to a PHP page?

3 votes

Monitor data a program sends to internet

3 votes

Am I required to hash passwords

2 votes

PHP Vulnerability May Halt Millions of Servers - max_input_vars!

2 votes

Restrict user login to a specific machine

1 vote

What are the best security practices to install a C# Web App on client servers?

1 vote

Should user input be validated for it's length?

1 vote

Hibernate SQL Injection - Fortify 360

0 votes

Store a password to avoid user interaction

0 votes

Strange Event Log Entry - Windows Server 2008