Skip to main content
0 votes
0 answers
43 views

I host several websites using Apache on a Linux compute box in the cloud. I have been playing with the idea of just making each virtual host a GIT repository and updating it every time I need to. Is ...
Justin Brunkow's user avatar
Best practices
0 votes
0 replies
13 views

After completing a PKCE OAuth2 flow, I want to send the following response: { "access_token": "abc...", "refresh_token": "def...", "id_token": &...
Rodrigue2g's user avatar
Advice
0 votes
1 replies
10 views

In SAML, man in the middle attack, for unsigned saml response, can the attacker create a new assertionId and also modify the notbefore, notafter timestamps? As of now the service provider relies on ...
a3.14_Infinity's user avatar
-3 votes
0 answers
38 views

during a reboot of a Windows Server 2008 server I saw the message “CherrySpy Undo”. There is an antivirus installed on the server, but there is nothing in its logs. Is this script legitimate?
Jen Markten's user avatar
1 vote
1 answer
99 views

To access a web API, I need to authenticate to the specific API first. In this use case, it concerns a Cyberark API method to: authenticate a user to Privilege Cloud and returns a token that can be ...
iRon's user avatar
  • 24.6k
-1 votes
0 answers
62 views

I have been wrestling with this question for a while concerning how to manage roles/permissions on multiple applications. We have multiple applications. Lets call them App-1, App-2 and App-3 and user-...
Eddy Freeman's user avatar
  • 3,367
Advice
1 vote
9 replies
60 views

We have been told that the difference between a junior/mid developer and a senior is the ability to solve the hardest problems like security concerns, performance issues or architectural questions. ...
Cihangir Yaman's user avatar
Best practices
1 vote
8 replies
54 views

I have a default Ubuntu installation used as a single-user system. It is not physically accessible to untrusted individuals. The machine is connected to the Internet, but no remote login services such ...
user23952's user avatar
  • 682
Advice
2 votes
10 replies
157 views

Can Anyone know what is the most enjoyable and career options in the tecnical fields like Android Development, Software development, Cybersecurity and their sub fields.... And other fields in tech.... ...
Arpan Biswas's user avatar
Best practices
2 votes
0 replies
18 views

I’m building a web application and started with authentication, but I keep feeling it’s incomplete. In a professional production environment, what are the essential steps or criteria to ensure the ...
MrYasyn's user avatar
1 vote
1 answer
92 views

We have a very strange issue that I am trying to solve or find the best practice for. We have a SwiftUI View that uses the Camera to preview. So as suggested in Apples Docs we check authorisation ...
Andy Donnelly's user avatar
0 votes
3 answers
86 views

Ok so - I have a JS file that loads the 10000 most googled english words into an array, then the body of the HTML is as follows: <Script src=G10K.JS> </Script> <Script> const ...
Jeremy Peters-Fransen's user avatar
Best practices
0 votes
2 replies
46 views

I am in my 3rd year of Engineering due to my drop year and I have one more year before I graduate (hopefully, please god). I want to pursue a career or at least get a starting job as a cybersecurity ...
Aryan Rasam's user avatar
Best practices
0 votes
5 replies
69 views

I am building a SaaS platform where each registered seller gets a subdomain like: foo.example.com Backend is Laravel 12 and frontend is Next.js, connected via REST API. Each subdomain represents a ...
Pooya Behravesh's user avatar
Best practices
0 votes
5 replies
67 views

I’m building a Windows-based IT Asset / Software Management system in C#. Each endpoint (agent) reports a list of installed software display names (from registry / uninstall entries). We also maintain ...
my activites's user avatar

15 30 50 per page
1
2 3 4 5
3755