StackRating

An Elo-based rating system for Stack Overflow
Home   |   About   |   Stats and Analysis   |   Get a Badge
Rating Stats for

L̲̳o̲̳̳n̲̳̳g̲̳̳p̲̳o̲̳̳k̲̳̳e̲̳̳

Rating
1480.22 (4,496,117th)
Reputation
9,939 (15,373rd)
Page: 1 2 3 4
Title Δ
Is it possible to write a wifi cracking util for Android phones? Mo... 0.00
How can I create a parallel stack and run a coroutine on it? +2.46
memory footprint issue -1.31
Why do you not use C for your web apps? +0.06
How to defend against TabNabbing? -1.42
How can I write software that runs very close to system start? +0.17
Python virtual classes: doing it right? -0.45
Preventing man in the middle attack while using https -1.95
What Language is This? +1.17
Assembly instruction address -1.38
When designing an event, is it a good idea to prevent listeners fro... +0.57
Interpreter more strict -1.36
Why are Python Programs often slower than the Equivalent Program Wr... +0.85
Best style for Python programs: what do you suggest? -2.77
RSA: Encrypting message using multiple keys -1.90
Tools to test softwares against any attacks for programmers? -3.12
C++ switch table performance +1.33
python lambda with print statement +4.12
pythonic way to do something N times +1.10
Compile unmanaged executable for BOTH x86 and x64 +4.69
Cross domain secure cookie usage? +4.29
problem with firefox tamper data plugin 0.00
strip spaces in python +4.29
Does USB 2.0 provide interrupts for connected devices? -0.10
Any good arguments for not writing unit tests? +2.49
Uploading PDF or .doc and security -1.87
How to create a CPU spike with a bash command +1.51
Threat Posed by Man-in-the-Middle Attacks -3.70
Is Apache blocking I/O? 0.00
Why are there only four registers? -1.84
If as assert fails, is there a bug? +4.10
How to specify execution time of x86 and PowerPC instructions? -2.27
Writing secure java code with RMI -0.89
Security strategies for storing password on disk -3.72
Javascript library: to obfuscate or not to obfuscate - that is the... +1.86
How to determine development tools used to make a Windows applicati... +1.06
What makes you trust that a piece of open source software is not ma... +3.27
Securing input of private / protected methods? -3.66
Is there any way to view PHP code (the actual code not the compiled... -2.11
Session ID Rotation - does it enhance security? +3.79
Is there a design pattern that expresses objects (an their operatio... +0.28
When encrypting data that is not an even multiple of the block size... +1.75
int datatype in 64bit JVM. Is it more "inefficient" than... +0.61
How to learn to program C++ the right way +3.72
Why are public static final array a security hole? +0.61
Securing files on IPhone -1.52
PHP Form Security With Referer -0.73
Is it secure to use malloc? -2.74
Why Java programs use .bat file as program launcher? +0.14
Is encrypting session id (or other authenticate value) in cookie us... -2.56