security-by-obscurity Questions
5
Solved
I'm working on an application which allows a moderator to edit information of user.
So, at the moment, i have URL's like
http://xxx.xxx/user/1/edit
http://xxx.xxx/user/2/edit
I'm a bit worried h...
Visible asked 22/4, 2014 at 13:29
8
Solved
I know that security through obscurity is frowned upon and considered not really secure, but isn't a password security through obscurity? It's only secure so long as no one finds it.
Is it just a ...
Ptolemaic asked 20/12, 2010 at 1:16
14
Solved
I've inherited a web app that I've just discovered stores over 300,000 usernames/passwords in plain text in a SQL Server database. I realize that this is a Very Bad Thing™.
Knowing that I'll...
Alecto asked 13/11, 2008 at 17:0
14
Solved
I recently came across a system where all of the DB connections were managed by routines obscured in various ways, including base 64 encoding, md5sums and various other techniques.
Why is sec...
Marbling asked 10/2, 2009 at 20:10
12
If you use a GUID as a password for a publicly facing application as a means to gain access to a service, is this security through obscurity?
I think the obvious answer is yes, but the level of se...
Meloniemelony asked 14/11, 2008 at 15:23
1
© 2022 - 2024 — McMap. All rights reserved.