TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 9)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

Sign-in with Apple user verification

I want to enable "Sign-in with apple" in my application. As you can see here App sends Token authorization code to the backend, and then...

Asked on 11/08/2021

0 answer

Regularly receiving suspicious certificate errors online

For the past few weeks, I have frequently been receiving error messages from websites stating that the certificate is invalid. This tends to happen for a while and then resolve...

Asked on 11/06/2021

0 answer

Is it a bad practice to store my user's ObjectId in a JWT in the sub claim?

Is it a bad practice to store my user's ObjectId in a JWT in the sub claim?I could create an alternate UUID field in the user database and use...

Asked on 11/06/2021

0 answer

Whom should I report spam emails to?

Today I received an email from a person in "critical health condition" who wants to give me about $10 million. It is clearly some kind of scam. What should I...

Asked on 11/06/2021

1 answer

Is it possible to brute-force the original message of SHA-256 given the size of original string?

Given the SHA-256 hash, the size and the encoding of the original string, is it possible to recover the string via brute force? How many string of a given size...

Asked on 11/06/2021

2 answer

How to secure my PHP url endpoints

I have a backend that I developed on PHP/MySql which will provide some URL endpoints in order to get data or post data. I am using those URL endpoints in...

Asked on 11/06/2021

1 answer

Is there any alternative to nmap for UDP?

I know UDP Scan is very slow and there are a lots of parameters for nmap like, --max-retries etc.But i want to speedly udp port scan. I tried a...

Asked on 11/06/2021

3 answer

How to validate client side safety in a Zero Knowlegde model

What is sometimes called Zero Knowledge, sometimes end to end encryption occurs when a server only processes ciphered data (at least for sensitive data) with a result where a compromise...

Asked on 11/06/2021 by Sibwara

1 answer

How to validate the integrity of a back end?

I just read following statement in a technical guideline about network-accessible mobile devices with medical applications (BSI TR 03161):The application MUST verify the integrity of the back...

Asked on 11/06/2021

1 answer

Is it safe to store session state of different apps in single Redis cluster?

We have "web app as a service" offering. And right now each app has its Redis which stores session data. Is it secure if we use one redis cluster for...

Asked on 10/28/2021

2 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP