Top new questions this week:
|
I'm running a server of which I protected the BIOS with a password. One doesn't have to enter this password before booting, but before entering the BIOS setup. I just did this from routine. However, …
|
As Google Glass slowly starts shipping, I've recently came across an article on stopthecyborgs.org that mirrors my anxieties that Google Glass currently does not feature a robots.txt for my face. It …
|
This question has been asked a few times, but always in the format
"How does examplewebsite.com implement their 'please enter xth yth and zth characters of your password' function?"
And the …
|
Just imagine you have a bunch of computers which need Java for some important software and you can't just switch to another vendor because all are using Java in this field of technology. If you start …
|
Imagine a generic web application with a login form to access the application. Regardless of how the actual authentication is performed, what are the implications of not checking the referer header to …
|
What tools can be used to make truly deniable encryption?
Suppose, authorities can use any force to make you open your passwords.
Truecrypt can have only one hidden container, which means that …
|
How secure is passwordcard.org? Assuming user follows recommended precautions:
Don't read along with your finger, or the smudge will tell a thief where your password is.
Keep your PasswordCard on …
|
Greatest hits from previous weeks:
|
To deposit money into your account, some websites require that you provide them with a lot of details about your bank account: name, complete address and IBAN which includes your account number and …
|
I'm deploying a web-based ERP system for a customer, such that both the server and the client machines will be inside the customer's intranet. I was advised in another question not to use TeamViewer …
|
Can you answer these?
|
I am studying the Clark-Wilson model, I can't exactly understand why the TPs must be executed in serial, is there a way to execute them in parallel?
What would happen if I did execute them in …
|
I am coding a REST web application that runs on Google App Engine, it authenticates API requests to privileged data using sessions by cookies provided by webapp2_extras.auth and …
|
Can someone guide me on what I've done wrong with implementing Google authentication app?
Here is what I've tried without success:
1# Create secret key
$chars = …
|