- Is it safe to use a weak password as long as I have two-factor authentication?
- Client side password hashing
- When using symmetric key encryption, do we need to sign?
- What is the potential impact of these SSL certificate validation vulnerabilities?
- Can someone detect the URL an android app uses?
- Encryption in an embeddded system
Wednesday, November 21, 2012
Stack Exchange posts pt. 2
Following my previous post on the subject, here are a few more links to posts on the Stack Exchange IT Security Q&A site:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment