直击两会花絮:“大片”原来是这样拍成的
百度 在任何情况下,思客认为用户的行为可能违反国家法律、法规,可以在任何时候不经事先通知终止向该用户提供服务。A tag is a keyword or label that categorizes your question with other, similar questions. Using the right tags makes it easier for others to find and answer your question.
Encryption is the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.
5973 questions
SSL (Secure Sockets Layer) and/or TLS (Transport Layer Security)
5906 questions
the process of establishing the authenticity of a person or other entity. Not to be confused with authorization - defining access rights to resources.
4606 questions
Specific to the security of passwords: hashing, entropy, cracking, resets, lockouts, etc.
4089 questions
An application that is accessed over a network such as the Internet or an intranet using a browser.
3427 questions
A piece of data used in public key cryptography (specifically public key infrastructures) that contains identifying information (i.e. email address or web address), a hash of a public key, and a digit…
2908 questions
Security of network infrastructure and network traffic. For questions about security of network equipment, topology, protocols, traffic, administration, and configuration. Related tags: [packet], [fir…
2897 questions
Malware is any software application which subverts the will of the legitimate owner of a computer, by means of force or subterfuge, with or without personal or monetary gain on the part of the creator…
2569 questions
Cryptography is the practice and study of logical means used to achieve information confidentiality, integrity and authenticity. It covers, among other things, encryption (making some data unreadable …
2394 questions
A hash algorithm is a function which takes a variable size input and produces a fixed size output. The algorithm tries to make it difficult to predict the output for a given input, find two inputs wit…
2322 questions
Related to security concerns specific to the Microsoft Windows operating system itself. For security of applications that happen to be running on Windows, please use [appsec]. For the X Window System,…
2256 questions
Securing Linux systems and applications; understanding Linux security features.
2170 questions
The attribute of a system that prevents the release of data to unauthorized individuals.
The ability or expectation of an individual or group to reveal information about themselves selectively or n…
2001 questions
Related to email protocols, clients, servers, content, and message format.
1828 questions
A web browser is an application which uses HTTP and related protocols to retrieve HTML and XML data from servers. As the web has become a critical source of information and communication, web browsers…
1688 questions
Security aspects concerning code written in the programming language PHP which is often used for web applications.
1642 questions
Cross-Site Scripting: An attack method that involves injection of code or markup into a webpage. There are three major types of XSS: Reflected XSS, Stored XSS (aka persistent XSS) and DOM-based XSS (a…
1548 questions
Definition: HTTP - the Hypertext Transfer Protocol - provides a standard for Web browsers and servers to communicate. The definition of HTTP is a technical specification of a network protocol that sof…
1500 questions
Questions tagged [Android] should focus on security of the operating system itself, or of Android-specific apps. Questions about Android that are not directly security-related should be asked at andro…
1396 questions
applied to questions related to various VPN types such as PPTP or IPSec.
1392 questions
A man-in-the-middle attack (MiTM) is an attack against a communication protocol where the attacker relays and modifies messages in transit. The parties believe they are talking to each other directly,…
1384 questions
The common name for the language used primarily for scripting in web browsers. It is not related to the Java language. Standardized as ECMAScript, its dialects/implementations include JavaScript and J…
1370 questions
A public-key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a…
1369 questions
The functions performed by the person or processes responsible for security of passwords on a given system.
1349 questions
OpenSSL is an open-source implementation of basic cryptographic primitives, X.509 certificate utilities, and SSL and TLS protocols.
1321 questions
The data, tools, and procedures which, when applied to a specific vulnerability, predictably violate the security design of a system.
1316 questions
A Certificate Authority is the collection of hardware, software, and people responsible for issuing certificates in a hierarchical PKI. CAs may be public, as in SSL / TLS and government IDs, or privat…
1314 questions
An attempt to penetrate a system's security in an effort to evaluate the protections in place.
1275 questions
An attempt to exploit a weakness in a system, either for nefarious or research reasons. Questions with this tag should be about designing, carrying out, or defending against the attack itself, rather …
1269 questions
SSH (Secure shell) is a protocol for secure communication between computers to execute remote commands, transfer data and tunnel TCP connections.
1238 questions
Security in mobile devices. Issues concerning regular cellphones, smartphones, tablet computers and other portable information devices all fit into this category. If your question is specific to one o…
1080 questions
A weakness or flaw in computer software and hardware which allows an attacker to take advantage of (exploit) a targeted system.
1061 questions
A computer virus is a program or piece of code that tends to be malicious and is loaded onto your computer without your knowledge and runs against your wishes.
1010 questions
Application security - Specific to security concerns for an application that are independent from the underlying operating system, or surrounding infrastructure. Pertains to the design / architecture,…
990 questions