Skip to main content
MikeSchem's user avatar
MikeSchem's user avatar
MikeSchem's user avatar
MikeSchem
  • Member for 8 years, 10 months
  • Last seen more than a month ago
34 votes
5 answers
7k views

Does it matter if a brute force search for a password returns a collision and not the password?

20 votes
7 answers
5k views

Is there a protocol that provides data integrity, but not encryption for HTTP?

16 votes
4 answers
11k views

Are there any Security Concerns to using Python F Strings with User Input

10 votes
5 answers
3k views

Does 2FA Help Prevent Unauthorized Access in Phishing Attacks?

9 votes
2 answers
14k views

Why is my Windows desktop using a DNS Server on localhost?

4 votes
0 answers
1k views

How can I get Suricata to alert on 1 packet every time

2 votes
1 answer
792 views

Could a certificate authority and a ISP preform a MITM attack on HTTPS traffic?

2 votes
0 answers
312 views

How to detect malformed MP4 files that crashes iOS devices

1 vote
0 answers
1k views

How to export decrypted https traffic from mitm proxy

1 vote
1 answer
3k views

Why can't I send raw HTTP requests with arbitrary headers from a web application? [closed]

1 vote
1 answer
544 views

What is the best form of authorization for captive portal WiFi

1 vote
1 answer
154 views

Why can't mail clients verify an email was sent from the user and server it claims to be from?

1 vote
2 answers
1k views

Getting root with setuid and the s flag

0 votes
0 answers
90 views

Is there a good way to use to find out how this was encrypted [duplicate]

0 votes
1 answer
1k views

Is there a good site I can use to convert a string into any encoding? [closed]