Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by elsadek
Which country was the first to use chemical weapon against civilians?
1 points
elsadek
2020-12-06T13:40:46Z
qr.ae
Energy Substack Proposal
3 points
elsadek
2020-12-05T13:25:43Z
area51.stackexchange.com
The risks of having an unsecured API, if there's no sensitive data?
2 points
elsadek
2020-12-02T07:20:08Z
security.stackexchange.com
What else can be used instead of an API Key as is implied by OWASP?
1 points
elsadek
2020-12-01T17:28:56Z
security.stackexchange.com
If Postgres trusts localhost, is it dangerous to visit random websites?
1 points
elsadek
2020-11-18T20:17:19Z
security.stackexchange.com
Is it necessary to force a newly registered user to login?
1 points
elsadek
2020-11-18T07:43:06Z
security.stackexchange.com
How to Prevent a Computer from Turning On?
1 points
elsadek
2020-11-16T07:24:20Z
security.stackexchange.com
How Not to Trigger a Disaster with Rm -r Command
1 points
elsadek
2020-11-02T06:34:29Z
hackernoon.com
How can I find out that a web server is setup as a reverse proxy?
1 points
elsadek
2020-10-31T18:06:04Z
qr.ae
Why always erase your field if something else was wrong on submission?
1 points
elsadek
2020-10-21T18:38:40Z
qr.ae
Is this email asking me to sent them $100 for details on a security flaw a scam?
1 points
elsadek
2020-10-19T20:03:17Z
security.stackexchange.com
Why cloud computing is considered as a revolution and challenging tech?
1 points
elsadek
2020-10-17T17:53:18Z
qr.ae
Why aren’t there any secure, paid browsers that put security a priority?
1 points
elsadek
2020-10-11T19:01:13Z
qr.ae
The image of Islam is bad globally. Who is responsible for this?
6 points
elsadek
2020-10-11T07:14:16Z
www.quora.com
Can a Core 2 Duo system still be useful today?
1 points
elsadek
2020-10-02T15:31:09Z
qr.ae
How can an Android device be unlocked, and how long would that take?
1 points
elsadek
2020-09-25T21:34:50Z
security.stackexchange.com
Document security – how to find who's leaked a confidential document?
11 points
elsadek
2020-09-19T22:29:39Z
security.stackexchange.com
That's why, since the year 1, we tend to write applications and API endpoints
4 points
elsadek
2020-09-19T22:25:55Z
security.stackexchange.com
What are the 7 deadly sins of programming?
3 points
elsadek
2020-09-19T22:19:34Z
techkettle.blogspot.com
Why use entropy at all in considering password strength?
2 points
elsadek
2020-09-18T22:46:11Z
security.stackexchange.com
1
2
3
4