Questions tagged as 'segurança'

7
answers

How to protect the source code?

I'm thinking of making an application to sell, I'd like to know how to protect my source code to keep my software safe. I have seen that the Java bytecodes, stored in the .class file are easily converted back to .java using the...
asked by 25.02.2014 / 16:07
6
answers

Algorithm against Brute-force

I've been thinking of an algorithm against Brute-force attacks that, as we saw in iCloud case , it can generate large headaches if treated with indifference. Initially I thought of this flow: Login Attempt:    [define uma sessio...
asked by 15.09.2014 / 15:00
2
answers

What is PHP Injection? What's the difference between it and SQL Injection? And how to avoid it?

What is PHP Injection? What's the difference between it and SQL Injection? How to avoid PHP Injection in my application? What are the main forms of PHP Injection type attack? Update Note : Remembering that SQL injection is not th...
asked by 13.08.2015 / 23:00
3
answers

Why parameterized SQL queries (name =?) prevent SQL Injection?

Why parameterized SQL queries ( nome = ? ) prevent SQL Injection? Can you cite examples?     
asked by 12.05.2015 / 13:24
3
answers

I am suffering from SQL Injection attacks

Since I opened an online project I'm having problems with trespassing, where someone is doing direct inserts in the database. It was the one that gave me initiative to by in all the variables received through the method $_GET and $_POS...
asked by 12.12.2015 / 12:36
1
answer

What is and what is JWT for?

I saw in some comment here on the site, in some question, talking about JWT to solve an authentication problem. I had seen the term loosely before and I thought it was something Java (hehehe). However, by looking at jwt.io , I realize...
asked by 26.09.2016 / 18:24
1
answer

What is Null Byte Injection? How to avoid it?

What would this Null Byte Injection be? How to avoid it?
asked by 14.08.2015 / 14:23