Skip to main content
D.W.'s user avatar
D.W.'s user avatar
D.W.'s user avatar
D.W.
  • Member for 13 years, 6 months
  • Last seen this week
165 votes
Accepted

Why would someone trust DuckDuckGo or other providers with a similar privacy policy?

114 votes
Accepted

Is it generally a bad idea to encrypt database fields?

93 votes

Can anyone provide references for implementing web application self password reset mechanisms properly?

92 votes
Accepted

Are URLs viewed during HTTPS transactions to one or more websites from a single IP distinguishable?

84 votes

How to achieve non-repudiation?

79 votes
Accepted

Should I use AntiForgeryToken in all forms, even login and registration?

78 votes
Accepted

Is Django's built-in security enough?

78 votes
Accepted

Can wiped SSD data be recovered?

76 votes
Accepted

Is HTTP compression safe?

75 votes
Accepted

Lessons learned and misconceptions regarding encryption and cryptology

68 votes
Accepted

Effectiveness of Security Images

66 votes
Accepted

Recommended # of rounds for bcrypt

65 votes
Accepted

Attacker circumventing 2FA. How to defend?

61 votes
Accepted

I think I accidentally DoS'd a website. What should I do?

56 votes
Accepted

Why do we ask for a user's existing password when changing their password?

55 votes

How great is the risk in publicly sharing part of a private key?

53 votes

CRIME - How to beat the BEAST successor?

52 votes
Accepted

My understanding of how HTTPS works (gmail for example)

52 votes
Accepted

I just send username and password over https. Is this ok?

51 votes
Accepted

At what point does "hacking" become illegal? (US)

47 votes

Lessons learned and misconceptions regarding encryption and cryptology

47 votes
Accepted

Where to report malicious URLs, phishing, and malicious web sites?

47 votes
Accepted

What cookie attacks are possible between computers in related DNS domains (*.example.com)?

47 votes
Accepted

Why is 0x41414141 associated with security exploits?

46 votes
Accepted

How does HSBC's "Secure Key" actually work?

44 votes
Accepted

Is it safe to store the database password in a PHP file?

44 votes
Accepted

Is making a clean install enough to remove potential malware?

42 votes

How feasible is it for a CA to be hacked? Which default trusted root certificates should I remove?

41 votes

How can I keep a roommate from seeing my web activity?

41 votes

What is the difference between an X.509 "client certificate" and a normal SSL certificate?

1
2 3 4 5
35