How do PGP and PEM differ?
Email messages are sent in plain text which means that the messages I send to Derpina are visible to anyone who somehow gets access to them while they are in transit.
Does the deprecation of mysql_* functions in PHP carry over to other Databases(MSSQL)?
I’m not talking about MySQL, I’m talking about Microsoft SQL Server I’ve been aware of PDO for quite some time now, standard mysql functions are dangerous and should be avoided. http://php.net/manual/en/function.mysql-connect.php But what about the MSSQL function in PHP? They are, for most purposes, identical sets of functions, but the PHP page describing mssql_* carries […]
Development-led security vs administration-led security in a software product?
There are cases where you have the opportunity, as a developer, to enforce stricter security features and protections on a software, though they could very well be managed at an environmental level (ie, the operating system would take care of it).
Would I be able to use code hosting services to host malware code?
Let me start by saying that I am a computer security researcher. Part of my job is to create malware to deploy on a controlled environment in order to study or evaluate several aspects of computer security.
How secure (or insecure) is it to install Node packages globally?
Should I be concerned with security when installing Node packages globally? Why or why not?
Drop in service for account management, authentication, identity?
I’m building an Android app and associated set of web services for uploading/downloading data. I need a basic (no frills) solution for account management (register, login, logout, verify credentials/token).
What is the Best Practice for creating a secure login in a client – server appllication?
It’s been a while I have been thinking on what could be the best scenario for creating a secure login in a client-server application running on internet or any other networks ! So I became with the idea to ask this question on programmers and I hope that this question will make awareness of new aspects of threads and security here by some kind of brain storming , I am really interested in good and new anseawres . Thanks in advance for your participation .
System that splits passwords across two servers
I stumbled upon this news article on BBC,
What are unique aspects of a software Lifecycle of an attack/tool on a software vulnerability?
At my local university, there is a small student computing club of about 20 students. The club has several small teams with specific areas of focus, such as mobile development, robotics, game development, and hacking / security.
Is using dirname(__FILE__) a good practice?
Looking at the code of Joomla I see that in the first line of the index, it defines the base path of installation with dirname(__FILE__)
.