Skip to main content

Questions tagged [scope]

1 vote
1 answer
130 views

I was going to ask a question about how to get user buy-in to some security changes I'm making at work. I know what changes I want to make, how, and why, but I am looking for advice on how to show ...
agentroadkill's user avatar
-2 votes
1 answer
286 views

Tamper data Chrome not working Could you please explain to me how a question about an extension, used for tampering data by many of security experts, is not related to a QA site on Information ...
bonugoso's user avatar
3 votes
2 answers
164 views

I'm searching for an Online Password Manager to move all my passwords to, and I'd like to ask to the community their choices and preferences. Is it acceptable to ask for the "top" Password Managers, ...
Peanuts's user avatar
  • 397
15 votes
1 answer
511 views

There is a proposal currently in evaluation to create a new site in the field of digital forensic science: Digital Forensics This appears to be a part of "Information Security" but we don't ...
Robert Cartaino's user avatar
2 votes
1 answer
95 views

The following question understandably popped up in the Hot Network Questions: I have the ability to run arbitrary Python code on the 'apache' user. What damage can I do? To my surprise, however, it ...
Amani Kilumanga's user avatar
2 votes
1 answer
228 views

In questions like: Obfuscating JavaScript code are treated some aspect of obfuscation of scripting languages, but not the obfuscation techniques for themselves (es. How can I produce obuscated code ?)....
mitochondrial's user avatar
24 votes
4 answers
2k views

I viewed the help center multiple times and, unless I'm missing something, I didn't see anything related to code-review being off-topic, so all this time, I assumed it was allowed here. Let's take ...
Mark Buffalo's user avatar
  • 22.6k
2 votes
1 answer
84 views

Over on Computer Science SE, we have a question about implementing an electronic signature system (signature in the sense of the scribble you put at the end of the letter): How can I implement a ...
David Richerby's user avatar
4 votes
2 answers
513 views

I was looking at Need to access old forgotten router that only supports SSLv3 and while I am fine with having it on the site, I am wondering if it fits on this site. On the Topic help page it ...
Shelvacu's user avatar
  • 2,393
9 votes
2 answers
344 views

Questions like "Is it legal to do X?" or "how to do Y legally ?" are quite frequent on the site and they benefit no one - most of them get closed pretty quickly but still waste everyone's time, ...
André Borie's user avatar
  • 12.9k
5 votes
2 answers
160 views

I have questions on how to use a specific cryptographic device (e.g. a smartcard) in combination with a standard OS (e.g. Windows and other well-known tools). These questions aren't about risk ...
SEJPM's user avatar
  • 9,850
36 votes
4 answers
1k views

I recently asked a question that made it to "Hot Network Questions" and picked up a huge number of views, upvotes and favorites in a very short time. The moderators put it "On Hold", because the ...
Shaul Behr's user avatar
  • 1,037
2 votes
2 answers
293 views

Here is my question: What does this malicious PHP script do? where I've asked about malicious PHP script which I've found on my hacked server and its method of action. In other words what harm it can ...
kenorb's user avatar
  • 839
19 votes
2 answers
902 views

I recently noticed that a lot of questions asking for how can I exploit this specific code or filter get closed (but a lot of them also do not get closed) or marked as duplicates of the general topic ...
tim's user avatar
  • 29.8k
0 votes
0 answers
100 views

In the android tag I'm seeing a wide variety of topics: How effective is a feature protecting data Why apps ask for more privileges they need What dangers represent a certain feature What dangers ...
Braiam's user avatar
  • 177

15 30 50 per page