I am having issue with our current login setup.We have multiple types of clients (mobile, webapp, spa).Our app has its own user managment a pretty old way to auth users (Each user recieve GUID and ...
[Update: It makes no sense to ask "How many of you have a firewall enabled on an Oracle database server?" as I did earlier today. So I'm changing the question]If your company uses Oracle ...
So I'm currently trying to setup two different security integrations. My snowflake instance already has a SAML security integration setup for users, where they're logging into okta using sso, this ...
I’m implementing an offline license validation mechanism in a desktop/server application.The license has an expiration date and must continue to work without any online checks.The problem I’m facing ...
I just wondering how can we intercept a download file and parse it before actually downloading the file. just like in android download via this or that app like when click download from any website i ...
I'm having trouble making my Python code generate the correct TOTPs using the test secret key 12345678901234567890, the same one used in the RFC6238 appendix B examples. I was able to get the correct ...
I'm building a webhook handler that needs to accept webhooks from multiple providers (Stripe, GitHub, Shopify, Twilio, etc.). Each provider uses different signature verification methods:- Stripe: ...
I’m working on a project where privacy is extremely important for both the client and the backend.Neither side should expose any sensitive or identifying information.A senior developer suggested ...
We are building a custom frontend application (SPA) that authenticates users against Microsoft Dataverse using MSAL and OAuth.The UI should hide certain navigation items and actions, e.g. show the &...
I’m researching the internal behavior of React Server Components (RSC) and the Flight protocol, specifically in relation to the React2Shell vulnerability (CVE-2025-55182).This exploit abuses the $@ ...
Some of the articles that I have seen lately imply that implementing a Back-end for Front End architecture is more secure for a SPA than a traditional setup as the tokens never leave the "...
I am preparing a project for a computer networks course and I wanted to ask for advice. My teacher gave me this assignment for the exam: make an analysis on the vulnerabilities and attacks to protect ...
I'm currently working on an app that stores secrets in an encrypted vault, and the key is derived from a user password. How can I securely prompt the user for their password? Is the IPC with invoke ...
(If you want to skip to the part I ask the question, scroll down to the last section with the heading "Concrete question".)I’m working on a home lab / learning project and would appreciate ...
While it is possible to use GitHub for releasing software with outdated sources or no sources at all,I wonder how legal it is and how what is official Microsoft position is.I think for most ...