Skip to main content
Tour
About Us
Meta
current community
Stack Exchange
chat
Meta Stack Exchange
your communities
Sign up
or
log in
to customize your list.
more stack exchange communities
company blog
Log in
Stack Exchange
All Sites
Top 400 Users
Digests
CBHacking
top
accounts
reputation
activity
subscriptions
Top Questions
39
votes
Is there an Apple USB Ethernet driver for Windows?
windows
usb
drivers
ethernet
asked Nov 24, 2015 at 7:04
superuser.com
13
votes
What are the challenges in Falcon 9 "full thrust" (v1.2) with densified propellant?
spacex
propulsion
falcon-9
fuel
merlin-1d
asked Dec 11, 2015 at 0:37
space.stackexchange.com
8
votes
How to launch a full-trust (desktop bridge) app from UWP with arbitrary parameters
uwp
windows-10
command-line-arguments
windows-10-universal
desktop-bridge
asked Sep 1, 2017 at 23:03
stackoverflow.com
7
votes
Certificate Pinning in Windows 10 Universal app
.net
ssl-certificate
dotnet-httpclient
windows-10-universal
asked Jan 7, 2016 at 23:38
stackoverflow.com
6
votes
Share named mutex between UWP and desktop app
uwp
synchronization
mutex
desktop-bridge
asked Sep 12, 2017 at 22:43
stackoverflow.com
5
votes
DPAPI / MacOS-style Keyring for Linux or BSD?
security
password
password-store
asked Feb 3, 2019 at 8:17
unix.stackexchange.com
Top Answers
210
How is the Heartbleed exploit even possible?
security.stackexchange.com
183
Is HostGator storing my password in plaintext?
security.stackexchange.com
101
Why does DocuSign require that your password "must not contain the characters <, > or spaces."?
security.stackexchange.com
99
What's the point of Microsoft Account 2FA if it still lets me log in using password instead?
security.stackexchange.com
98
How do hackers trick frontend validation?
security.stackexchange.com
97
Is it dangerous to compile arbitrary C?
security.stackexchange.com
91
Why is the OS obfuscation defense against "It's a Unix system!" not widely implemented?
security.stackexchange.com
82
How are all public computers (libraries, etc.) not full of malware?
security.stackexchange.com
70
Why is SMS OTP not as secure as Authenticator Applications such as Microsoft Authenticator?
security.stackexchange.com
70
How can I ensure my API is only called by my client?
security.stackexchange.com
57
Is there an Apple USB Ethernet driver for Windows?
superuser.com
56
Is a BitLocker recovery key an unavoidable brute-force attack vulnerability?
security.stackexchange.com
55
Why don't some services offer Google/Facebook/Apple/Twitter login
security.stackexchange.com
53
Does a password policy with a restriction of repeated characters increase security?
security.stackexchange.com
51
Are SSL certs auto-revoked if their Not-Valid-After date is reached without renewing?
security.stackexchange.com
49
How do I marshal a struct that contains a variable-sized array to C#?
stackoverflow.com
46
What are the potential vulnerabilities of allowing non-root users to run apt-get?
security.stackexchange.com
45
What is the equivalent of the bin directory for Windows?
superuser.com
44
Security considerations of x86 vs x64
security.stackexchange.com
43
Shouldn’t patterns be just as secure as PINs?
security.stackexchange.com
43
Is it really safe to pass sensitive data to another script via stdin, compared to passing via arguments (Linux)
security.stackexchange.com
41
Why are unused launch abort rockets jettisoned rather than used to augment thrust?
space.stackexchange.com
41
How to change windows service name after creating it
superuser.com
41
Securing API keys for a Twitter account for a program to be run on other PC's
security.stackexchange.com
39
How can I block localhost access from other computers on the same local network?
security.stackexchange.com
38
Does knowing the file type of an encrypted file make it easier to decrypt?
security.stackexchange.com
38
Can we prevent SSL Pinning Bypass by pinning key instead of certificate?
security.stackexchange.com
36
Why are refresh tokens treated differently than access tokens
security.stackexchange.com
36
Could receiving a URL link, not clicking on it, ever pose a security problem?
security.stackexchange.com
35
Is Bcrypt a hashing algorithm or is my study material wrong?
security.stackexchange.com
1
2
3
4
5
…
9
next