Skip to main content
Tour
About Us
Meta
current community
Stack Exchange
chat
Meta Stack Exchange
your communities
Sign up
or
log in
to customize your list.
more stack exchange communities
company blog
Log in
Stack Exchange
All Sites
Top 400 Users
Digests
Peter Harmann
top
accounts
reputation
activity
subscriptions
Top Questions
No questions with score of 5 or more
Top Answers
192
Secure way of masking out sensitive information in screenshots?
security.stackexchange.com
186
Received a set of SMS/MMS containing 2 photos, a voice message, and a text "I need help" with Google Maps link from a known contact. Is it spam?
security.stackexchange.com
175
Is it more secure to program a client-server system in a language other than English?
security.stackexchange.com
68
Why is this certificate for Imgur only valid for one day?
security.stackexchange.com
54
What considerations do I need to keep in mind when enforcing passphrases?
security.stackexchange.com
39
Is there any security risk when a certificate authority is used more than all others?
security.stackexchange.com
27
What local resources are used when bruteforcing a remote service?
security.stackexchange.com
15
How to call popen() with a pathname containing spaces under Windows in C/C++?
stackoverflow.com
15
Why would I ever use AES-256-CBC if AES-256-GCM is more secure?
security.stackexchange.com
9
Should a "password reset" link be valid after changing email?
security.stackexchange.com
9
Is it safe to store APK signing passwords in private git repository?
security.stackexchange.com
7
Should we use different usernames for each website, to achieve better anonymity?
security.stackexchange.com
7
How to prevent "JailBreak detection bypass" by Cydia tools such as "Flex 3" etc?
security.stackexchange.com
7
Is it okay to save passwords as base64 strings with no other hashing or encryption beforehand?
security.stackexchange.com
7
Diffie-Hellman with non-prime modulus
security.stackexchange.com
7
Alternative to bcrypt in .NET Core?
security.stackexchange.com
7
How well can Tor + VPN secure my anonymity on the internet?
security.stackexchange.com
6
What are the relation (difference and similarities) between Replay attack, reflection attack and relay attack?
security.stackexchange.com
6
Does Time-based One Time Password improves security in case of database leak?
security.stackexchange.com
6
The basic difference between RSA algorithm and Shor's algorithm
security.stackexchange.com
6
Do different files always have different MD5 or SHA1 hash codes?
security.stackexchange.com
6
How well can Tor + VPN secure my anonymity on the internet?
security.stackexchange.com
5
How do I know if a Certificate Authority is not fake?
security.stackexchange.com
5
As a security compliance professional, what should I do if I find that my employer has a PCI AOC but is not compliant?
security.stackexchange.com
5
Can a badly configured AppArmor profile reduce security?
security.stackexchange.com
5
How vulnerable are rolling codes used in car keyfobs to simple replay attacks?
security.stackexchange.com
5
Why is it recommended to use accounts without sysop rights for everyday work?
security.stackexchange.com
5
Rolling your own crypto
security.stackexchange.com
5
Isn't password storage designed to not un-mask passwords?
security.stackexchange.com
5
Is it possible to include a PHP Function while performing SQL Injection?
security.stackexchange.com
1
2
next