Top "Security" questions

Topics relating to application security and attacks against software.

How does the SQL injection from the "Bobby Tables" XKCD comic work?

Just looking at: (Source: https://xkcd.com/327/) What does this SQL do: Robert'); DROP TABLE STUDENTS; -- I know both …

security validation sql-injection
How to secure database passwords in PHP?

When a PHP application makes a database connection it of course generally needs to pass a login and password. If …

php database security
Fundamental difference between Hashing and Encryption algorithms

I see a lot of confusion between hashes and encryption algorithms and I would like to hear some more expert …

security encryption hash cryptography
How to make a machine trust a self-signed Java application

I'm deploying an application using JAWS, and it worked until late 2013 when I got a warning, and then this morning …

java security certificate java-web-start self-signed
Why is JsonRequestBehavior needed?

Why is Json Request Behavior needed? If I want to restrict the HttpGet requests to my action I can decorate …

c# .net asp.net-mvc asp.net-mvc-3 security
Spring Test & Security: How to mock authentication?

I was trying to figure out how to unit test if my the URLs of my controllers are properly secured. …

spring security model-view-controller testing junit
JWT (JSON Web Token) automatic prolongation of expiration

I would like to implement JWT-based authentication to our new REST API. But since the expiration is set in the …

node.js api security authentication jwt
What are all the user accounts for IIS/ASP.NET and how do they differ?

Under Windows Server 2008 with ASP.NET 4.0 installed there is a whole slew of related user accounts, and I can't understand …

asp.net security iis user-accounts
Encrypt Password in Configuration Files?

I have a program that reads server information from a configuration file and would like to encrypt the password in …

java security encryption configuration cryptography
What is the difference between a cer, pvk, and pfx file?

What is the difference between a cer, pvk, and pfx file? Also, which files do I keep and which am …

security public-key