Find answers to your questions about Information Security or help others by answering their Information Security questions.
I have reason to believe that there is a persistent backdoor on my device, one which is not removed after a re installation of the OS. I wanted to know...
Asked on 01/13/2021 by joshnow
1 answerThere is a standard XSS exploitation technique where one can use javascript keyword in <a href=""> to execute javascript code. Example:<a href="javascript:alert(42);">please clickme</a>Let's us consider PHP code which uses...
Asked on 01/12/2021 by Awaaaaarghhh
1 answerQUESTION: Can an empty, but used, usb flash drive that has NO firmware within it be infected with malware? I have been told by a networking and security expert that...
Asked on 01/10/2021 by 888.999
2 answerHow accurate is this XKCD comic from August 10, 2011? ...
Asked on 01/09/2021
22 answerI'm working on some security for a website that is built in classic ASP and MS SQL 2000. I've successfully found a couple of flawed forms that allowed SQL injections...
Asked on 01/08/2021 by Brigante
2 answerI have a bulletin on my site that all valid users have access to (read and write). User input posted to this bulletin is stored in JSON. Because of these...
Asked on 01/08/2021 by Newb 4 You BB
1 answerDifferent companies seek permission to start and run, from our organization. I am approval or permission-giving authority. I am having an inspector who goes to different places and visits companies...
Asked on 01/06/2021 by Olle Hudga
0 answerI need to encrypt some sensitive fields back and forth in browser and server, same goes for decryption, for this I am planning to implement AES algorithm, but the problem...
Asked on 01/06/2021 by Jian25
0 answerI am currently using JWT implementation for the authentication part of my APIs. A private key is used to sign the token generated and used to make sure...
Asked on 01/04/2021 by darren19824
3 answerI just got an email from the Unsplash service telling me that someone had logged into my account via credential sniffing: ...
Asked on 01/04/2021
1 answerGet help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP