Top new questions this week:
|
I’m working with a customer where I use a functional user ID, created specifically for the purpose, to install and configure some software on multiple servers. The customer’s security policies, …
|
I’m trying to understand the purpose of defining self-issued certificate concept in RFC5280 (Internet X509 PKI Certificate and CRL Profile): Regarding this concept the RFC states: This specification …
|
GitHub Blog: github.blog/2023-01-17-git-security-vulnerabilities-announced-2 Git has 3 new Remote Code Execution vulnerabilities. It’s said in the blog that Git was already patched by version …
|
I am posting to ask about two conflicting password recommendations. I know only bits and pieces about cryptography. Let me begin by checking a basic assumption: in a cracking attempt, a string is …
|
I don’t want wine accessing my ext4 partition which is typically the Z: drive. How can I restrict or sandbox wine?
|
As you may know, Common Criteria (AKA ISO/IEC15408: A standard for IT Security Evaluation) have provided some security base-line documents named “Protection Profile” for software developers …
|
I made a website which among other things allows users to sign up to events. The HTML form is filled out and submitted, which automatically updates a google spreadsheet with all applications. This of …
|
Greatest hits from previous weeks:
|
Google Authenticator is an alternative to SMS for 2Step verification, installing an app on Android where the codes will be sent. It works without any connectivity; it even works on plane mode. This …
|
I have been interested in Information Security. I was recently introduced to the idea of hashing. What I currently understand about hashing is that it takes the password a user enters. Then it …
|
I log on to my works wifi throughout the the day whilst at work, I use apps like WhatsApp and iMessages to communicate when I need to, can my employer see the content of those messages (actually read …
|
I am running an Android phone without a SIM card. I am using it for web surfing. Can the police localize my phone using the cell towers (BTS)? In other words, I know Android phones emit radiations …
|
Maybe I have been negligent towards the verification of software I download over the Internet, but I (or anybody I ever met) have never tried to verify the checksum of the contents I download. And …
|
I found an unknown MAC address connected to my home router. How would I figure out what OS the IP or MAC address is running?
|
I have found out recently that the remote assistant software that we put in a smartphone we sell can be activated by us without user approval. We are not using this option, and it is probably there …
|
Can you answer these questions?
|
I have a product I am making available to some users that runs via a Jupyter notebook. I deploy Jupyter inside of a docker container to an EC2 host. Each user gets an instance I’ll send to them. For …
|
I have an old phone that I am trying to recover the data from. I was hoping to desolder the chip and buy an expensive reader for NAND flash chips but then it occurred to me that the contents of the …
|
I am experiencing some issues when using mmls command after having created an image with dcfldd/guymager in some particular situations. Usually this approach seems to be working fine to create …
|