56,325 questions
0
votes
0
answers
43
views
Apache GIT Workflow
I host several websites using Apache on a Linux compute box in the cloud. I have been playing with the idea of just making each virtual host a GIT repository and updating it every time I need to. Is ...
Best practices
0
votes
0
replies
13
views
Safe ways to deliver access tokens to both browser and mobile clients?
After completing a PKCE OAuth2 flow, I want to send the following response:
{
"access_token": "abc...",
"refresh_token": "def...",
"id_token": &...
Advice
0
votes
1
replies
10
views
In SAML, man in the middle attack, for unsigned saml response, can the attacker modify values?
In SAML, man in the middle attack, for unsigned saml response, can the attacker create a new assertionId and also modify the notbefore, notafter timestamps?
As of now the service provider relies on ...
-3
votes
0
answers
38
views
Windows Server 2008R2 CherrySpy Undo is legit? [closed]
during a reboot of a Windows Server 2008 server I saw the message “CherrySpy Undo”. There is an antivirus installed on the server, but there is nothing in its logs. Is this script legitimate?
1
vote
1
answer
99
views
How to hide a password send to a web API from Windows logging
To access a web API, I need to authenticate to the specific API first.
In this use case, it concerns a Cyberark API method to:
authenticate a user to Privilege Cloud and returns a token that can be ...
-1
votes
0
answers
62
views
Managing user roles & permissions on multiple applications [closed]
I have been wrestling with this question for a while concerning how to manage roles/permissions on multiple applications. We have multiple applications. Lets call them App-1, App-2 and App-3 and user-...
Advice
1
vote
9
replies
60
views
What is the real difference between a junior and senior developer?
We have been told that the difference between a junior/mid developer and a senior is the ability to solve the hardest problems like security concerns, performance issues or architectural questions. ...
Best practices
1
vote
8
replies
54
views
Passwordless Ubuntu
I have a default Ubuntu installation used as a single-user system. It is not physically accessible to untrusted individuals. The machine is connected to the Internet, but no remote login services such ...
Advice
2
votes
10
replies
157
views
What is most enjoyable and high paying career options in tecnical field?
Can Anyone know what is the most enjoyable and career options in the tecnical fields like Android Development, Software development, Cybersecurity and their sub fields.... And other fields in tech....
...
Best practices
2
votes
0
replies
18
views
What are the security and feature checkpoints for considering an authentication system “complete” in a web application?
I’m building a web application and started with authentication, but I keep feeling it’s incomplete. In a professional production environment, what are the essential steps or criteria to ensure the ...
1
vote
1
answer
92
views
Camera permission issue on Xcode 26?
We have a very strange issue that I am trying to solve or find the best practice for.
We have a SwiftUI View that uses the Camera to preview. So as suggested in Apples Docs we check authorisation ...
0
votes
3
answers
86
views
Setting newtab.location.href fails to redirect a different tab
Ok so - I have a JS file that loads the 10000 most googled english words into an array, then the body of the HTML is as follows:
<Script src=G10K.JS>
</Script>
<Script>
const ...
Best practices
0
votes
2
replies
46
views
I want to pursue cybersecurity but I only have one year
I am in my 3rd year of Engineering due to my drop year and I have one more year before I graduate (hopefully, please god). I want to pursue a career or at least get a starting job as a cybersecurity ...
Best practices
0
votes
5
replies
69
views
Should multi-tenancy be enforced in backend even if tenant is resolved on frontend (Next.js + Laravel API)?
I am building a SaaS platform where each registered seller gets a subdomain like:
foo.example.com
Backend is Laravel 12 and frontend is Next.js, connected via REST API.
Each subdomain represents a ...
Best practices
0
votes
5
replies
67
views
How to reliably match installed software names against a curated software inventory without false positives
I’m building a Windows-based IT Asset / Software Management system in C#.
Each endpoint (agent) reports a list of installed software display names (from registry / uninstall entries).
We also maintain ...