Top new questions this week:
|
Unfortunately a quick Google search didn't reveal, neither explanations nor claims, that it is important to logout of a webapp (online banking, Amazon, Facebook, etc. ), instead of just closing the …
|
One time while I was printing my documents at the copy center and I saw they drag-and-drop my PDFs from my flash drive to their desktop.
How do I protect files without using password? Is there a way …
|
Stuxnet and others in this list of state-of-the-art Internet worms had certain features that they were very stealthy in leaking out the information they harvested. Thus it managed to go under the …
|
I'm trying to make a service that keeps as little data on its users as possible. To that end, I want to make sure that someone using forensic tools won't gain any more information than I would by …
|
I am trying to find information on how to encrypt something in such a way that there are n keys, and k of them are needed for decryption. However, I have been searching Google for half an hour but …
|
Android supports using facial recognition for unlocking your phone. How secure is that mechanism?
For instance, if someone has a good quality picture of your face, can they defeat the facial …
|
A "reputable" education company that my university utilizes for it's Physics
course online materials sent my plaintext password in an email after using the Forgot Password? tool.
I know that this is …
|
Greatest hits from previous weeks:
|
A friend of mine just started a job at a security sensitive company. They've provided him with a laptop with Windows XP Professional installed. He's heard a rumor from other employees that the laptops …
|
I have an Android device with the Gmail app installed. This app can access the mailbox so there must be some kind of authentication data stored on the device (possibly an application specific …
|
Can you answer these?
|
Using OAuth you have a consumer key and consumer secret to identify your application and the user provides an OAuth access token and secret to authenticate your application access to their account, …
|
Hope you can help me here. There is a chipset I am working with that utilizes an ARM cortex -A7 as the Application processor and an ARM 9 Baseband processor.
I had a major concern since the ARM …
|
I understand the purpose of the Access-Control-Allow-Credentials header, but can't see what problem the Access-Control-Allow-Origin header solves.
More precisely, it's easy to see how, if …
|