Top Questions

active hot week month
2
votes
1
answer
67
views

Can NSEC domain enumeration happen for zones with wildcard records?

dns dnssec
9m ago Community 1
0
votes
2
answers
43
views

#include <string.h> ...">Stack Overflow on ARM : Null Bytes Issue

exploit buffer-overflow
3h ago Thomas Pornin 51.3k
2
votes
3
answers
40
views

provable security and sandboxes

sandbox theory
4h ago Thomas Pornin 51.3k
7
votes
1
answer
87
views

What is the most hardened set of options for GCC compiling C/C++?

buffer-overflow mudflap gcc dangling-pointer c++
8h ago 3ntr0py 21
0
votes
0
answers
29
views

sanesecurity - clamav - getting a false positive - should I bother?

email antimalware
11h ago Saariko 101
14
votes
6
answers
1
kviews

Why do we ask for a user's existing password when changing their password?

web-application passwords authentication password-management
12h ago Craig Curtis 175
2
votes
1
answer
61
views

Android Application penetration testing

penetration-test android
12h ago Rook 14.9k
1
vote
1
answer
72
views

When can closing port 80 be a problem?

http ports
13h ago Jeff Ferland 16.7k
3
votes
2
answers
125
views

If a port is closed how come you can still use it?

firewalls ports
14h ago Jeff Ferland 16.7k
14
votes
5
answers
820
views

Do non-keyboard characters make my password less susceptible to brute forcing?

passwords brute-force
15h ago Thomas Pornin 51.3k
15
votes
8
answers
1
kviews

Best password strength checker

passwords brute-force password-policy
15h ago Thomas Pornin 51.3k
15
votes
5
answers
277
views

Hashed password storage with random salt

passwords hash php random salt
16h ago Thomas Pornin 51.3k
15
votes
9
answers
888
views

Is a simple, but very long password a good password?

passwords hash
16h ago Thomas Pornin 51.3k
24
votes
8
answers
1
kviews

What methods are available for securing SSH?

ssh hardening
16h ago Thomas Pornin 51.3k
0
votes
1
answer
19
views

Implementing a commitment scheme in java

cryptography java
17h ago Thomas Pornin 51.3k
12
votes
5
answers
279
views

What is the best option for setting up a several sites supporting SSL on the same IP?

ssl webserver
21h ago Thomas Pornin 51.3k
13
votes
5
answers
674
views

How valuable is secrecy of an algorithm?

cryptography passwords reverse-engineering obscurity theory
22h ago D.W. 39k
6
votes
3
answers
248
views

How should I compile program for fuzz testing?

fuzzing
1d ago Rook 14.9k
4
votes
1
answer
46
views

Trusted Timestamping Scope and Real-World Uses

cryptography trust timestamp
1d ago Thomas Pornin 51.3k
1
vote
3
answers
60
views

What are the main weaknesses of mobile software based OTP generators?

otp
1d ago Thomas Pornin 51.3k
1
vote
1
answer
27
views

XER encoded X.509 certs

ssl public-key-infrastructure
1d ago Thomas Pornin 51.3k
0
votes
0
answers
12
views

Can i Change the password of Backtravk running in Live USB? [migrated]

passwords linux usb-drive backtrack
1d ago D.W. 1
2
votes
1
answer
36
views

What security risks are involved with sending data over the internal network on Rackspace Cloud servers?

encryption network firewalls cloud-computing
1d ago Lucas Kauffman 6,667
1
vote
1
answer
76
views

Updated version of Browser Security Handbook

web-application web-browser
1d ago makerofthings7 8,842
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.