Trending Web Application Security Discussions

Follow

Ask the Community


Ask any professional question and get answers from other specialists.

Stream language
Ali Joudeh's image
Question added by Ali Joudeh Senior Full Stack Developer Derq Systems FZ LLC
7 years ago

What are your perspectives on securing auth Tokens generated from a token based authentication system like JWT?‎

When a client authenticates with token based authentication, the server responds with a signed token, since the client has the token at hand, that authenticated client ca‎ ... See More

Answers:
1
Followers:
Views:
44
Vote Count:
0
Answer should contain a minimum of 25 characters.
Default profile image
Question added by Deleted user
11 years ago
Answers:
2
Followers:
Views:
122
Vote Count:
1
Answer should contain a minimum of 25 characters.
Mohamad JAvad Khazali's image
Question added by Mohamad JAvad Khazali Information Security Expert Saman Bank
11 years ago
Answers:
3
Followers:
Views:
110
Vote Count:
0
Answer should contain a minimum of 25 characters.
ngong constantine mbufung's image
Question added by ngong constantine mbufung Data Scientist YooMee Mobile
11 years ago

Which is the best way to limit IP address visit to particular web pages?‎

i wish to limit the number of people that visit my web page by blocking their IP of using cookie i don't know how to go about this‎

Answers:
4
Followers:
Views:
145
Vote Count:
0
Answer should contain a minimum of 25 characters.
Nicu Mailinator's image
Question added by Nicu Mailinator Programmer E&M
8 years ago
Answers:
0
Followers:
Views:
40
Vote Count:
0
Answer should contain a minimum of 25 characters.
abisoye Sonubi's image
Question added by abisoye Sonubi Information Security/ Risk specialist Ecobank Nigeria Limited
7 years ago
Answers:
4
Followers:
Views:
7
Vote Count:
0
Answer should contain a minimum of 25 characters.
Evin Abraham's image  
Answer added by  Evin Abraham, Information Security and Technology Risk Specialist, ANZ Operations and Technology Private Limited (ANZ)
6 years ago

Nessus Vulnerability Scanner, Burp Suite, Zed Attack Proxy