Top new questions this week: |
Until now, I have been using VPN client on my computer. I did this to hide the fact that I was using Tor, as well as other activities, from my ISP. I would like to change my configuration. I want to ... |
I've got a service currently using PBKDF2-HMAC-SHA256 for password hashing, and I thought I'd upgrade that to something a wee bit more GPU-resistant, so I've been checking out my options, comparing ... |
Greatest hits from previous weeks: |
Most users would simply type ssh-keygen and accept what they're given by default.But what are the best practices for generating ssh keys with ssh-keygen?For example:Use -o for the OpenSSH key ... |
I have a requirement to implement Facebook and Google login in my web application. I also need to access a user's Facebook/Google+ friend list.I have gone through the complete OAuth2 documentation of ... |
I need a brief explanation about the differences between antiviruses and firewalls |
A lot of people recommend using Ed25519 instead of RSA keys for SSH.The introduction page of Ed25519 (http://ed25519.cr.yp.to/) says:[..] breaking it has similar difficulty to breaking [..] RSA ... |
I have always wondered why so many websites have very firm restrictions on password length (exactly 8 characters, up to 8 characters, etc). These tend to be banks or other sites where I actually care ... |
I guess the gist of my question is: Are there cases in which CBC is better than GCM?The reason I'm asking is that from reading this post by Matthew Green, and this question on cryptography stack ... |
What is the difference between .pfx and .cert certificate files?Do we distribute .pfx or .cert for client authentication? |