StackRating

An Elo-based rating system for Stack Overflow
Home   |   About   |   Stats and Analysis   |   Get a Badge
Rating Stats for

Marek Puchalski

Rating
1484.48 (4,474,338th)
Reputation
77 (828,601st)
Page: 1 2 3
Title Δ
Should I use local storage in Electron for database config? +4.08
MS Access and SQL Server Encryption 0.00
Unininstalling git on mac -3.06
Memory efficient way to represent shortest path? -0.07
Fixing Incorrect Permission Assignment for Critical Resources (CWE... 0.00
Calculate difference between values with MySQL (PV) +0.06
Is there a way to show a toast only when something has been changed... 0.00
Brute Force Login Prevention With Iptables 0.00
What is the easiest way to create a raw disk image of a VMware guest? -4.19
is there a possibility to visualize entity-relationship-model of my... 0.00
How test a method with @Transactional annotation +4.09
How to do a simple "failable" main in springboot with @au... -3.90
How to join two tables such that same column from both the tables a... +2.81
How to get only the MAX Value from Total for each stand_id 0.00
Two packages are in same folder then while importing package1 in pa... 0.00
JWTParser - NoSuchMethodError - ObjectMapper.readerFor 0.00
Reset button for a GUI counter -3.90
Is it safe to secure URL parameters via a hashed key? +0.98
Is the advice on google developer website enough to secure Android... 0.00
Practical risk of using static IV amongst sparsely duplicated values? -0.03
How to use Cipher without IV(Initialization Vector) 0.00
How do I pass secret key to URL via a QR-code? 0.00
Can TCP Inter-Process-Communication become a vulnerability? 0.00
How is an authentication follow designed? -2.36
How Java (Java8) fix WhiteHat "Improper Certificate Validation... 0.00
Which is more better between basic auth and token auth as security... -4.03
Spring: How to add XSS protection to @RequestBody in a RESTful serv... 0.00
Is there a security risk in exposing the MongoDB url to the public? 0.00
How to prevent Rest web-service Authentication with stolen Token +3.94
Can security vulnerabilities for testing dependencies threaten my a... 0.00
Which of the following keeps a user logged in when they are browsin... 0.00
Is there a way to secure EXE file? -0.08
Security connection Java Socket 0.00
Logging failures in JEE container managed authentication 0.00
Convert CSV values to a HashMap key value pairs in JAVA -1.67
How can I call a method on each element of a List? 0.00