Topics relating to application security and attacks against software.
I've recently used our company's spare laptop (that has a general user set up) while mine was being repaired. I've …
sql-server security login ssmsLicense keys are the defacto-standard as an anti-piracy measure. To be honest, this strikes me as (in)Security Through Obscurity, …
security cryptography license-keyIs there an equivalent of the OS X Keychain, used to store user passwords, in Windows? I would use it …
windows security passwordsI'm looking at hashing algorithms, but couldn't find an answer. Bcrypt uses Blowfish Blowfish is better than MD5 Q: but …
security encryption passwords hashHow do prepared statements help us prevent SQL injection attacks? Wikipedia says: Prepared statements are resilient against SQL injection, because …
sql security sql-injection prepared-statementThe current top-voted to this question states: Another one that's not so much a security issue, although it is security-related, …
security language-agnostic encryption hash passwordsWe are looking for a Wireshark-like tool to use on the iPhone to test a 3rd party application before partnering …
iphone security networking wireshark