Skip to main content
The 2024 Developer Survey results are live! See the results

Explore our questions

0 votes
1 answer
143 views

It is possible to receive ntlm response with ipv6. What about ipv4?

0 votes
1 answer
528 views

Unable to execute shellcode in stack with no DEP

45 votes
12 answers
8k views

Would it be more secure or not if all computers in the network use the same operating system?

9 votes
1 answer
2k views

What is the difference between TEE and HSM in Android Pie?

5 votes
1 answer
439 views

Does HTTP/3 necessitate additional - beyond HTTP/2 via TLS1.3 - restrictions on client authentication (mTLS)?

1 vote
0 answers
20 views

Why does this malicious code work? (Lua, FFI)

1 vote
1 answer
74 views

How do I encrypt and store user data?

4 votes
3 answers
3k views

If my old device is infected, can my new device get viruses from my social media accounts?

2 votes
2 answers
832 views

Local Burp Proxy not showing routed packets

5 votes
1 answer
364 views

Securing Transactional Email: User Input Escaping for a email subject

0 votes
0 answers
117 views

What are the effective open-source methods for storing and managing encryption keys in a language-agnostic manner when an HSM is unavailable?

1 vote
1 answer
58 views

How to limit the Wireless CA can only use in wireless connection on Windows?

3 votes
2 answers
157 views

How can there be incoming connections when using a VPN?

6 votes
1 answer
2k views

Pivoting with Metasploit

Browse more Questions