security tag

47 questions


1 answers
329 views
0
Is CORS configuration the only CSRF countermeasure for Rails API x Next?

In the Rails API x Next configuration, we plan to use session cookies to manage the login status.In this case, just setting up CORS on the Rails API is enough to ensure CSRF countermeasures?If CORS is...


2 answers
339 views
0
about the possibility of being attacked

Thank you for your help.I would like to inquire about the possibility of server intrusion and attack from outside.If you run the following command and leave SSL certificate turned off, Could you tell ...

2 years ago

1 answers
341 views
0
Does a dedicated server provide more protection against host attacks than virtual servers?

When selecting a server, I looked up the keywords for VPS, cloud, and dedicated servers and found the following statement:Why not recommend anonymous VPN ibVPNWe are actively utilizing the cloud and V...

2 years ago

1 answers
441 views
0
Is it safe to publish below /var/www in production deployment?

I'm a beginner at Linux & Larvel.I'm concerned about security for production deployments./var/www The following is the public directory?projectName = laraproject.Default Public Directory Server Values...

2 years ago

3 answers
118 views
0
What do the two asterisks used to specify directories represent?

** is used as a matter of course without any explanation when you want to express a directory recursively. What is this notation? It doesn't seem to be a regular expression.Example: Try implementing u...


1 answers
98 views
0
CONTROL OF COMMUNICATION OF BLACKLISTED URLS

I think Excel and word files will be sent via email, but if the IT literacy is low, I think I will download it and browse it.That's all right, but when I read it and it says, Do you want to enable mac...

2 years ago

1 answers
149 views
0
Understanding PHP MySQL Prepared Statements Security

I made the following prepaid statement.id:int type, name:varcher type, area:int type.Assume area is a number from 1 to 10 that represents the position where you live.For example, 1=Kanto, 2=Kansai, 3=...

2 years ago

1 answers
144 views
0
Security Considerations for Creating Linux Systems

Due to various circumstances, I am thinking of creating a Linux desktop environment using Gentoo Linux.It hasn't been long since I touched Linux, so I'm worried about connecting to the network without...

2 years ago

1 answers
144 views
0
About file_get_contents, wp_remote_get Risks

It supports the Google AMP page.Write style amp-custom directly to the header Automatically generating css files from the sass fileWrite in gulp or in php file_get_contents Load or use wordpress wp_re...

2 years ago

1 answers
88 views
0
How should secret keys be managed?

I created a web application using Ravel 8 and Firebase Authentication.We have installed a json file downloaded from Firebase under resources/keys/ and are using it on the application side with referen...

2 years ago
- 1 - »

© 2024 OneMinuteCode. All rights reserved.