Movatterモバイル変換


[0]ホーム

URL:


Information Security Stack Exchange Community Digest

Top new questions this week:

VPN client on a router versus VPN client on a computer

Until now, I have been using VPN client on my computer. I did this to hide the fact that I was using Tor, as well as other activities, from my ISP. I would like to change my configuration. I want to ...

vpntorrouter 
user avatarasked byzbroqvfuktscvn Score of 1

GPU speedup for PBKDF2 vs bcrypt vs Argon2

I've got a service currently using PBKDF2-HMAC-SHA256 for password hashing, and I thought I'd upgrade that to something a wee bit more GPU-resistant, so I've been checking out my options, comparing ...

password-crackingbcryptpbkdf2argon2 
user avatarasked byDolda2000 Score of 1

Greatest hits from previous weeks:

What are ssh-keygen best practices?

Most users would simply type ssh-keygen and accept what they're given by default.But what are the best practices for generating ssh keys with ssh-keygen?For example:Use -o for the OpenSSH key ...

encryptionsshkey-generationopenssh 
user avatarasked byTom Hale Score of 298
user avataranswered byAdam Katz Score of 310

Should we store accesstoken in our database for oauth2?

I have a requirement to implement Facebook and Google login in my web application. I also need to access a user's Facebook/Google+ friend list.I have gone through the complete OAuth2 documentation of ...

authenticationoauthauthorizationfacebook 
user avatarasked byDeepak Kumar Padhy Score of 115

What is the difference between antivirus and firewalls

I need a brief explanation about the differences between antiviruses and firewalls

firewallsantivirussoftware 
user avatarasked byChenthil Vel Murugan . A Score of 1
user avataranswered byEbenezar John Paul Score of 22

SSH Key: Ed25519 vs RSA

A lot of people recommend using Ed25519 instead of RSA keys for SSH.The introduction page of Ed25519 (http://ed25519.cr.yp.to/) says:[..] breaking it has similar difficulty to breaking [..] RSA ...

cryptographysshrsaecc 
user avatarasked byBen Richard Score of 187
user avataranswered byTom Leek Score of 154

What technical reasons are there to have low maximum password lengths?

I have always wondered why so many websites have very firm restrictions on password length (exactly 8 characters, up to 8 characters, etc). These tend to be banks or other sites where I actually care ...

passwordspassword-policy 
user avatarasked byenderland Score of 895
user avataranswered byTom Leek Score of 1850

Why would I ever use AES-256-CBC if AES-256-GCM is more secure?

I guess the gist of my question is: Are there cases in which CBC is better than GCM?The reason I'm asking is that from reading this post by Matthew Green, and this question on cryptography stack ...

encryptionaesfile-encryptionjsonxml 
user avatarasked byThe Quantum Physicist Score of 101
user avataranswered byTherac Score of 86

Difference between .pfx and .cert certificates

What is the difference between .pfx and .cert certificate files?Do we distribute .pfx or .cert for client authentication?

tlscertificates 
user avatarasked byXsecure123 Score of 173
user avataranswered byThomas Pornin Score of 229
You're receiving this message because you subscribed to the Information Security community digest.
Unsubscribe from this community digest     Edit email settings     Leave feedback     Privacy
Stack Overflow

Stack Overflow, 14 Wall Street, 20th Floor, New York, NY 10005

<3

[8]ページ先頭

©2009-2025 Movatter.jp