StackRating

An Elo-based rating system for Stack Overflow
Home   |   About   |   Stats and Analysis   |   Get a Badge
Rating Stats for

berkay

Rating
1471.79 (4,516,988th)
Reputation
3,020 (55,985th)
Page: 1 2
Title Δ
How to make SYN FLood via HPING 0.00
Not able to decrypt an encrypted file using DES in java from a diff... +0.51
Making connection to oracle database using properties file -2.03
Encrypt AES with C# to match Java encryption +1.34
Big-O Hierarchy and comparisons -3.07
Real world applications where Spanning tree data structure is used? 0.00
Exception order -2.18
What exactly is the web-app version? What does it affect? -3.73
JSF button with customized dynamic image +0.39
f:convertDateTime displays wrong hour 0.00
Include files in JSF dynamically from enum? 0.00
primefaces update attribute not working 0.00
UDP Networking Fundamentals +1.80
How to get hash value from PBE key generator 0.00
Using SVD to compress an image in MATLAB -3.51
Blog database inquiry 0.00
PCA on large Sparse matrix using Correlation matrix -3.84
the xampp appache server also support in Java EE -3.96
Example of AES using Crypto++ 0.00
EL syntax error: Expression cannot start with binary operator +0.21
Is it possible to design a Java EE web application without using ja... 0.00
Primefaces <p:selectOneMenu> display issue 0.00
Rule of thumb for determining web server scale up and down? 0.00
What are the mappings of user to kernel? +4.13
Android file security -3.76
Are there any difference between data integrity and data consistency? -3.94
Lockout policy and one-time passwords -2.60
Android Security & Hacking 0.00
Problem using Connect(), send(), recv, with UDP sockets -4.09
Help me understand the assembly code +0.93
Are users commonly implemented as Roles with the ability to login? 0.00
What's the big deal with brute force on hashes like MD5 +0.89
Why is using a Non-Random IV with CBC Mode a vulnerability? -2.53
How to check for a file's authenticity? -1.16
DES、AES、RC4, which encryption method should I use for cellphone Enc... -4.44
What ways do you use to protect copy righted images? -2.88
Methods for ensuring security between users in multi-user applicati... -2.13
Database indexing - how does it work? +3.92
Lists Hash function +1.46
What is meant by two legged authentication? +4.51
Sources for news about network security +2.00
gnuplot png export -2.87
Problem finding difference between two time intervals +1.72
Requiring clients to solve computational puzzles +1.18
./a.out termniated . Garbage output due to smashing of stack . How... +0.11
How do I detect bots programatically -1.80
Bar Chart on Iphone 0.00
makefile extension +4.39
URL Redirection +0.58
How to make Amazon EC2 not cause SSL invalid error in browser -3.25