dialog
listlengths
4
30
title
stringlengths
15
150
category
stringclasses
14 values
dialog_time
stringdate
2016-01-21 01:59:30
2018-07-01 01:34:46
[ { "message": "My class is without a textbook, or any structured learning material for that matter. I am doing all my learning through googling and while I am picking it up as I am doing it, it is slow going to be honest.Class assignment: <blockquote> There is a program (psuedocode somewhat) in the file prog-ba...
Identifying vulnerabilities in simple program with malloc
security
2017-10-30T20:29:24.663
[ { "message": "Let's assume a simple network with a (Windows) server and a (Windows) workstation. Turns out the question of how to securely transfer files between the two isn't obvious considering:I define <code>secure</code> in this context as preventing an attacker with control of any of the two devices to pro...
File transfer secure from a network security perspective
security
2017-10-31T10:43:12.887
[ { "message": "Does it matter if you're using a VPN do hide your ip on an Android phone when you use apps like youtube, facebook, or third party open source apps like NewPipe (youtube) or \"Tinfoil for Twitter\" or \"Tinfoil for Facebook\"? Will WebRTC give away my ip anyway, or is that just for browsers?", ...
Android apps, does WebRTC IP-leak affect other apps than browsers (like youtube etc)
security
2017-10-31T11:42:39.327
[ { "message": "Here is what I want to do:We create reports for customers, normally we send them as pdf to our customer who then shares them with colleagues across his company. We want to switch now to digital reports.The report is accessible only via URL with UUIDWhen the user clicks on the link, he is redirecte...
UUID in URL - how safe from accidental discovery is my proposed solution?
security
2017-11-01T13:27:06.617
[ { "message": "Is it possible to restrict the access of android phones, iphone, and MS phones and tablets to a specific AP?I want the corporate mobile device to only be able connect to one specific AP (the corporate WIFI LAN) and I don't want the user of the device to be able to change this. These are not perso...
Restrict mobile phones to specific Access Point (WIFI Router)
security
2017-11-02T05:26:41.970
[ { "message": "I'm looking through the CSRF vulnerabilities of the DVWA. I run into the medium level which uses this piece of code to validate if the <code>referer</code> header equals the server name:<code>if( eregi( $_SERVER[ 'SERVER_NAME' ], $_SERVER[ 'HTTP_REFERER' ] ) )</code>. If so, my query will be accep...
How to forge Referer Header in GET method triggered on HTML
security
2017-11-04T17:40:23.633
[ { "message": "A security risk with ordinary flash drives is that they have re-writable (flashble) firmware, which basically lets a hacker replace the operating system of the USB drive with their own.Are there any USB drives that are guaranteed to be read-only and do not allow their firmware to be re-flashed?", ...
Are there USB flash drives with read-only firmware?
security
2017-11-05T01:58:15.000
[ { "message": "I read <a href=\"https://hackerone.com/reports/265050\" rel=\"nofollow noreferrer\">this interesting report which describes a SSRF vulnerability allowing to fetch internal images by using the url property in a path element. However, even though this vulnerability most likely relies on the server r...
SSRF PoC using fill="url(...)" with absolute path
security
2017-11-06T00:08:16.897
[ { "message": "I have two questions regarding the CSP directive <code>upgrade-insecure-requests</code> which I couldn't answer myself by reading the <a href=\"https://w3c.github.io/webappsec-upgrade-insecure-requests/\" rel=\"nofollow noreferrer\" title=\"specification\">specification.What happens to ressources ...
CSP: upgrade-insecure-requests - what happens with https-incompatible ressources?
security
2017-11-06T08:30:30.997
[ { "message": "I have two questions regarding the CSP directive <code>upgrade-insecure-requests</code> which I couldn't answer myself by reading the <a href=\"https://w3c.github.io/webappsec-upgrade-insecure-requests/\" rel=\"nofollow noreferrer\" title=\"specification\">specification.What happens to ressources ...
CSP: upgrade-insecure-requests - what happens with https-incompatible ressources?
security
2017-11-06T08:30:30.997
[ { "message": "I have a large API and JSON Web Tokens (JWT) used for user authorization. These tokens are validated on frontend (nginx proxy) with Lua code. Now I want to secure my API a little more with browser fingerprints. The idea is to store client fingerprint in JWT token and pass this fingerprint from cli...
Best practices for storing and submitting browser fingerprints to secured endpoints
security
2017-11-06T12:01:51.410
[ { "message": "Can dial locks, such as the one below, have repeated numbers in their combination? For example, the combination 10-39-10 has the number 10 repeated twice in it. If so how often is this the case?", "role": "user" }, { "message": "Yes, these locks can have repeated first and third digits...
Do dial locks have repeated numbers?
security
2017-11-08T02:26:36.227
[ { "message": "I'm working on a documentation of an IT system and I want to describe what is happening, when McAfee finds and quarantines a suspicious file. I have read the <a href=\"https://security.stackexchange.com/questions/120047/what-is-quarantine\">many <a href=\"https://security.stackexchange.com/questio...
Are there differences between McAfee quarantine and other AV quarantining mechanisms?
security
2017-11-08T14:53:22.050
[ { "message": "I'm going to implement digital signatures for corporate use. For that, I would develop an application for signatures, generate public/private keys for all employees and store private keys in the Active Directory database.To sign the document in the application, an employee has to authenticate via ...
Digital signatures in a corporate network
security
2017-11-10T10:41:02.600
[ { "message": "I am currently trying to mask the OS system I am using from the websites I visit. I'm doing this for an added layer of security. How would I go about hiding the OS from websites?", "role": "user" }, { "message": "The EFF (Electronic Freedom Frontier) have produced a \"how unique is my ...
How do I hide the OS I am using from internet sites?
security
2017-11-10T20:33:16.007
[ { "message": "Requirement 1 <blockquote> All output data exiting the cryptographic module via the \"data output\" interface shall only pass through the output data path. The output data path shall be logically disconnected from the circuitry and processes while performing manual key entry.</blockquote>Requir...
Conflicting requirements in FIPS 140-2 regarding manual key entry
security
2017-11-13T12:58:31.110
[ { "message": "I've have looked at and considered <a href=\"https://security.stackexchange.com/questions/172889/question-about-potential-iso-infection-and-iso-verification\">Question about potential ISO infection and ISO verification and <a href=\"https://security.stackexchange.com/questions/86234/how-do-i-check...
Can an OS .iso downloaded from Microsoft.com be compromised after the download?
security
2017-11-13T21:46:31.727
[ { "message": "I want to mentally visualize or just understand a gpg-signature. When running<pre><code>$ gpg2 --list-packets --verbose &lt; test.sig</code></pre>the output is<pre><code># off=0 ctb=89 tag=2 hlen=3 plen=540:signature packet: algo 1, keyid C109A1FD84E2C2E5 version 4, created 1510595093, md5len 0...
Analysis of gpg2 packets
security
2017-11-14T12:45:02.960
[ { "message": "I'm trying to find a tool to validate the security of a password and I've come across <code>cracklib</code> or <code>libcrack2</code> (on Debian), which seems to be used a lot for the task and appears to do exactly what I wanted.However, it does not really depict the requirements I imagined. For a...
Check the "security" of a password
security
2017-11-14T14:02:16.623
[ { "message": "I will pose an academic perspective in my question, but I welcome any and every observation. So a botnet would generate 1000s of domain/day and an actual attacker will register a few, which will be used with a certain probability. Point is, given a dataset of say a million domains and without the ...
Finding/Predicting BotNet Generated Domains Without DGA Knowledge
security
2017-11-15T14:19:59.373
[ { "message": "I've found <code>gpg -c &lt; unencrypted_file &gt; encrypted_file</code> this command from <a href=\"https://askubuntu.com/questions/27770/is-there-a-tool-to-encrypt-a-file-or-directory\">https://askubuntu.com/questions/27770/is-there-a-tool-to-encrypt-a-file-or-directory this page, but in gpg man...
Are these gpg commands identical?
security
2017-11-17T00:31:19.803
[ { "message": "Have the Linux USB drivers been patched for the <a href=\"https://nakedsecurity.sophos.com/2017/11/14/google-researcher-finds-79-linux-usb-vulnerabilities/\" rel=\"nofollow noreferrer\">recent vulnerabilities that have been found by Andrey Konovalov (Google)? If not what can be done to protect ag...
Have the recent Linux kernel USB vulnerabilities found by Andrey Konovalov been patched?
security
2017-11-17T09:16:21.940
[ { "message": "I just received an email that seemingly comes from Microsoft (invites@microsoft.com). Apart from asking Microsoft, is there a way to properly authenticate an email's origin with public key etc? (Especially from a company like MS or google?)I just finished an Crypto intro course and am just curious...
How can I authenticate the origin of an email?
security
2017-11-18T15:36:09.600
[ { "message": "Setting up an AWS instance with the instructions <a href=\"http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-key-pairs.html#verify-key-pair-fingerprints\" rel=\"nofollow noreferrer\">here, I create a public/private keypair. I understand the public key fingerprint is usually just a hash of the...
How does a keypair fingerprint work?
security
2017-11-21T02:21:00.417
[ { "message": "I am curious how secure the following approach is for authentication:By every account I encrypt data with known structure using a symmetric algorithm (e.g. AES or twofish) with a password derived key. The data can be for example a JSON encoded object an XML or anything else, which is easy to verif...
How secure is this authentication approach compared to hashing?
security
2017-11-21T05:51:25.427
[ { "message": "In a simple way? If I use VirusTotal (for example) how do I differentiate if it's just the RAT or if it's also backdoored? Or is there software to check?", "role": "user" }, { "message": "The problem of assessing the security of \"blackhat\" software is, as you've mentioned, that many ...
How do I know whether the RAT tool (cracked/) I am downloading isn't backdoored?
security
2017-11-21T07:18:37.813
[ { "message": "FIPS 140-2 allows FIPS approved algorithms to be either tested by CAVP or to be vendor affirmed. What does \"vendor affirmed\" imply here? Can I say my AES implementation as vendor affirmed and get it added to the FIPS certificate?", "role": "user" }, { "message": "This is a bit of a g...
What are vendor affirmed algorithms in FIPS 140-2
security
2017-11-21T12:50:30.773
[ { "message": "ContextI work on a very common case. I configured two servers: an OpenVPN and a MySQL (172.16.X.X) server hidden behind it.Let’s assume everything is perfectly configured and patched server side. Note:MySQL server has no public network interfaceMySQL has no TLS configured. It does not use PAM auth...
How likely it is that a (MySQL) client leaks credentials when VPN tunnel was not set previously?
security
2017-11-23T11:54:06.510
[ { "message": "I would like to know how you make employees report incidents. Incident reports are a key element of an ISMS. No reports = No discovery of the incident = High chance things go out of control.We have a kind of game: people can give red cards to each other for small incidents. The cards tell them to ...
How to make people report incidents?
security
2017-11-24T11:50:57.667
[ { "message": "This question is related to this <a href=\"https://stackoverflow.com/questions/47495817/how-can-i-authenticate-a-websocket-connection-where-client-and-server-reside-on\">question I askedTo summarise, I'm playing with websockets at the moment and I'm trying to understand how to authenticate a clien...
Why can't websockets support custom headers?
security
2017-11-26T12:04:43.543
[ { "message": "I might have missed parts of the technicality when it comes to the initial state of the key exchange. However, If I'm not wrong, if the initial key exchange is done over an insecure channel, how can one be sure that this first encounter is not \"wiretapped\"?I've read someone say <a href=\"https:/...
How can one guarantee that a Diffie-Hellman initial key exchange is not stored?
security
2017-11-28T16:18:51.933
[ { "message": "My team has had some challenges with our current internal PKI management tools and we are looking for other solutions. One of my team members forwarded me a link to a page about <a href=\"https://medium.com/netflix-techblog/introducing-lemur-ceae8830f621\" rel=\"nofollow noreferrer\">Lemur, an op...
Certificate management: private key distribution with Netflix Lemur framework
security
2017-11-28T17:49:48.047
[ { "message": "I basically cannot find any credible information online as to how secure OPAL 2.0 drives are, and so I don't really know how much, or in what cases, I can trust their encryption to keep my data safe if the drives get into the wrong hands.Do they do proper encryption? Do they store the keys securel...
How secure is OPAL 2.0?
security
2017-11-29T07:40:51.430
[ { "message": "The <code>.rodata</code> section in ELF files contains parts of the text segment that are not meant to be changed. By default, all pages from this section are read-only, and any attempt at modification will trigger a general protection fault. The Linux syscall <code>mprotect()</code> is capable of...
Can mprotect() be used to change the permissions of .rodata?
security
2017-11-29T21:24:10.180
[ { "message": "I ran Responder in a test network and obtained hashes from a Windows machine. The logs for the machine show something like this (some bytes changed for security reasons) and are stored in a file called \"SMB-NTLMv2-SSP-192.168.2.12.txt\":user::user-PC:1122334455667788:0340FB9C9E4F88BEEBBC92105213B...
Cant crack Responder hashes with John or Hashcat
security
2017-11-30T21:39:00.093
[ { "message": "Questions: based on the details provided below, (a) what potential security vulnerabilities and threats might I face in my use of wget and (b) what recommendations would you give for mitigating those vulnerabilities and threats?Goals: as per a recommendation by @forest, these are my security goals...
wget: what security issues am I not considering?
security
2017-12-02T18:04:18.990
[ { "message": "Logitech (and possibly other) mice offer a feature called \"flow\": mouse can pair with uop to 3 devices (PC, handheld, ...), and can mark, copy &amp; paste content (even files) between these 3 devices (according to the description, not bought yet). This would make life much easier for me, since s...
"Flow" between computers (Logitech mouse)
security
2017-12-03T12:23:25.413
[ { "message": "I'm planning a home backup setup, and I'm not sure if I really understand this quite right. The idea is I'll set up a Linux server on the network that contains two drives. Drive1 will be network-accessible and used as a backup location for several other machines on the network as well as a general...
Is this Backup Safe from Ransomware?
security
2017-12-04T22:46:20.560
[ { "message": "We live in a world where password reuse is common and most of the internet users are not using password managers, while hacks and breaches are becoming more common. The importance of those breaches lays not only in an access to the compromised website, but in a fact, that leaked passwords are comm...
Benefits to client-side password hashing on top of other security mechanisms
security
2017-12-05T08:30:36.897
[ { "message": "Given in OAuth 2.0 or some other Web Application or even REST API server. How would you protect users from using a malicious client or a compromised browser?For OAuth client secret can be placed in an existing application and extracted <a href=\"https://security.stackexchange.com/questions/80641/...
How would you protect a user against a malicious client?
security
2017-12-05T20:15:51.443
[ { "message": "assuming the following:publicly reachable webserver - administered via SSHno X window system installed and no X11 forwarding through SSHattacker has gained access and is able to run a shell as my regular non-root admin userCan they obtain the passwords I type at the command line, e.g <code>sudo</c...
Is it possible for an attacker to log my keystrokes on a linux server which has no X window system?
security
2017-12-06T06:48:00.290
[ { "message": "Consider the following hypothetical algorithm for password-based login for, say, SSH:The client sends its <code>username</code> and <code>client_auth = HMAC(password, client_timestamp)</code> to the server.The server verifies the <code>client_auth</code> and responds with <code>server_auth = HMAC(...
Is this password scheme as secure as public-key authentication?
security
2017-12-06T13:16:37.107
[ { "message": "I am trying to detect a string in HTML (already unzipped) with Snort. I set this rule to find content <code>7038685658</code> in my Apache web server's HTML:<pre><code>alert tcp any any &lt;&gt; any any (msg:\"cell\"; file_data; content:\"7038685658\"; sid:9000001)</code></pre>This is the location...
How to detect a string in HTML with Snort?
security
2017-12-06T16:46:06.987
[ { "message": "I'm looking at the following code and am trying to figure out how this bug would be helpful for something like launching a shell. <pre><code>int func(int i, double *data1, double data2) {double *p = data1; double *vec[10];if ((i&lt;0) || (i&gt;10)) return; vec[i] = data1; *p = data2; ...
control flow (buffer overflow) (introductory question)
security
2017-12-07T20:04:07.393
[ { "message": "I want to run untrusted software in a way that can only destroy files belonging to that software.I believe such is common on GNU/Linux, e.g. running Apache as user \"www\" that only has read access for its data and read/write access for its temp files.How do i achieve the same on Windows?", "r...
Safely running malware without a VM
security
2017-12-07T21:08:07.890
[ { "message": "If an attacker uses proxy list from a US based company, investigators can use the logs to retrace the attacker's real IP address (even if the proxies are in China, logs should be kept).If the company was based elsewhere, no diplomatic relations with the US/Europe, no logs.What can an investigator ...
How can an attacker using Kali/Parrot proxychains, no Tor, no logs kept by proxy providers, be tracked down?
security
2017-12-08T15:16:41.870
[ { "message": "There are many financial services that can verify a user's bank account by asking for their username and password, and signing in on their behalf. Some examples are <a href=\"https://www.coinbase.com/\" rel=\"nofollow noreferrer\">Coinbase and <a href=\"https://transferwise.com/\" rel=\"nofollow n...
Is this technique a secure way to confirm a user's bank account details, without requiring them to provide their credentials?
security
2017-12-08T18:48:46.257
[ { "message": "After reading the excellent <a href=\"https://security.stackexchange.com/a/20847/136919\">answers here and <a href=\"https://www.sans.org/reading-room/whitepapers/protocols/ssl-tls-beginners-guide-1029\" rel=\"nofollow noreferrer\">documents about how SSL works. I have a doubt about what the funct...
SSL/TLS - Does the client select symmetric key for data encryption?
security
2017-12-11T12:13:08.383
[ { "message": "<a href=\"http://secondlemon.com/whatsdog-whatsapps-watchdog/\" rel=\"noreferrer\">Whatsdog detects whether your victim is online or not. What are they doing in the background? We know that Whatsapp does not provide any API or SDK for this, so how can anyone monitor this type of sensitive activity...
How can application like Whatsdog detect user online status from Whatsapp?
security
2017-12-12T12:58:14.690
[ { "message": "<a href=\"http://secondlemon.com/whatsdog-whatsapps-watchdog/\" rel=\"noreferrer\">Whatsdog detects whether your victim is online or not. What are they doing in the background? We know that Whatsapp does not provide any API or SDK for this, so how can anyone monitor this type of sensitive activity...
How can application like Whatsdog detect user online status from Whatsapp?
security
2017-12-12T12:58:14.690
[ { "message": "I am interested in understanding if it is possible to predict Python 3 <code>random.random()</code> when seeded with high entropy value from a physical system, like a dice toss.In other words, is <code>random.random()</code> a good function that takes \"entropy\" and reduces it to an unpredictable...
Is it possible to predict Python's random.random() if it is constantly seeded with high entropy values?
security
2017-12-12T14:26:06.533
[ { "message": "A domain with a checkered pastI work at a company that purchased a .com domain around a year ago, and it uses this domain for its web site and e-mail now. However, the previous owner had a site (last online several years back) on the domain which was pornographic in nature. The site is now G-rat...
Remove domain from web filter blacklists
security
2017-12-12T19:53:50.817
[ { "message": "I'd like to simulate how my router will allow an outside intruder into my LAN if they know my dynamic IP address. So for that purpose, let's say that I know my IP address to be <code>abc.def.ghj.klm: 80</code>. Typing that into my browser address bar doesn't retrieve anything at all.Does that mean...
Does no response on port 80 mean that my router is blocking incoming connections?
security
2017-12-13T12:02:41.310
[ { "message": "When would it make more sense to:check the origin header use a CSRF token (in double submission or something) Use the SameSite cookie directivefor CSRF defense. Checking the origin header seems like it offers the most versatility over the other two, so I'm not sure why I'd want to use the other tw...
When would I use the origin header vs SameSite directive vs csrf token for CSRF defense
security
2017-12-14T23:25:46.667
[ { "message": "Something very weird happens when I control my code execution to fish out integer overflows. The control program checks the value of the overflow flag using inline assembly.Code:<pre><code>#include &lt;stdio.h&gt; #include &lt;stdlib.h&gt; #include &lt;stdint.h&gt; int add_u32(uint32_t a, uint32_t...
Integer overflow check not detecting some cases
security
2017-12-16T00:20:51.500
[ { "message": "I`m curious. If a connection to some server is not secure, can that connection be redirected with one more server in between that will encrypt these files for you? What is that service called?Basically, connection is made with server that will encrypt your requests and decrypt them for that insecu...
Make secure connection with help of a server
security
2017-12-16T20:06:31.397
[ { "message": "I am setting up a new MySQL server in the office. The client app, connecting from the same LAN, is now in beta testing. So I can still change authentication system and other stuff there. Currently I decided to compile the string of private key into the app. The client first provides the key and g...
How to secure MySQL server for the case of hardware theft
security
2017-12-16T22:08:29.953
[ { "message": "Recently, I've worked on setting certificate pinning for our mobile app. I'm using the hash of the Subject Public Key Information (SPKI) for the pinning. Now, I was under the impression that SPKI will be the same if I'll create another certificate from the same private key. So I tried it out - I c...
Should Subject Public Key Information be the same in 2 different certificates created from the same CSR?
security
2017-12-21T06:06:58.393
[ { "message": "Here is the PHP filter function that I'm dealing with:<pre><code>function xss_check_2($data) { return htmlentities($data, ENT_QUOTES); }</code></pre>The source code of the output (the output is the name, Peter Wazinck, at the bottom): <pre><code>&lt;div id=\"main\"&gt;&lt;h1&gt;HTML Injection...
How to bypass htmlentities() function in PHP to get an XSS?
security
2017-12-21T19:43:29.993
[ { "message": "I've got a mobile app to test, and the url where requests from mobile app are sent is <code>mapi.example.com</code>, but the company told me that it would be great if I could send all requests to <code>mapitest.example.com</code>. The application response and requests are same for both urls, but t...
How to intercept and replace request URL through Burp Proxy?
security
2017-12-21T20:40:40.720
[ { "message": "What information does a gpg2 signature contain?If you clearsign an empty file, the signature looks like this:<pre><code>-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256-----BEGIN PGP SIGNATURE-----Version: GnuPG v2jQIcBAEBCAAGBJaPoTMAoJEMEJof2E4sLl4hgP/355iZSmAWcgF8ADUMcL85Wa...KyugtYr0DewOPPA83kd7B...
What information is in a gpg cleartext signature?
security
2017-12-23T17:00:28.653
[ { "message": "Our organization uses Outlook as email service and hence have our organization email domain. If someone from the organization sends a spam or phishing email to someone else in our organization, its received by the recipient.I tried sending a simple spam email (copied from personal Gmail account Sp...
Why does Outlook not block spam sent by employees?
security
2017-12-26T10:09:57.623
[ { "message": "Let's say I have the following where <code>k</code> is any length stringIf I do the following<pre><code>var p = aes256.decrypt(k, 'XXXXXXXXXXXXXXXXXXXXX');</code></pre>The value of <code>p</code> will always equal nothing. Can this please be explained in really simple terms? <code>XXXXXXXXXXXXXXXX...
Why does setting cipher text to 21 characters mean plain text is nothing in AES256
security
2017-12-27T09:41:31.107
[ { "message": "I'm having difficulty understanding the impact the client nonce has. I understand that the server nonce can prevent the replay attack. Isn't the client nonce an unnecessary part of the replay attack prevention? For example, a client that has the intention of initiating a replay attack can just use...
What's the purpose of the client nonce in SSL?
security
2017-12-28T03:47:09.503
[ { "message": "My car license plates tend to have 3 or 4 digits and 3 or 4 characters.If I were to combine two (or more?) of them, throw in a plus sign or similar and uppercase one or two characters, how secure would that be?Let's not worry about someone looking over my shoulder and recognize me typing a few cha...
How secure is using car number plates as a password?
security
2017-12-28T12:54:32.293
[ { "message": "We have a public website. The site also contains the intranet (although none of the data on the intranet pages are terribly secret). Users have to login to the website using their Active Directory credentials to see intranet pages.The web server is in the DMZ, but the port for LDAPS is open thro...
Best practice for connecting publicly available server to internal LDAP/Active Directory?
security
2017-12-29T06:39:02.453
[ { "message": "I have created a vulnerable Code for Open redirect vulnerability, but now I want to secure it. But unfortunately, I didn't find on google so decide to come here., So, this is my html file code, in which I provide the next parameter. <pre><code>&lt;html&gt;&lt;form action=\"/demo/userin2.php?next=h...
How do I prevent the URL open redirect vulnerability?
security
2017-12-29T09:44:05.107
[ { "message": "Design:People should be able to store the partial-key in a unobtrusive form but the unobtrusive form should not be used to decrypt sensitive content on its own.The design should allow to be plausible deniable because the parts should not look like keys.How it worksTwo (or more) pieces of informati...
Design for secure offline storage of key with two or more parties by key sharing
security
2017-12-31T06:25:57.017
[ { "message": "I am testing OpenSSL by executing the Known Answer tests provided <a href=\"http://www.mediacrypt.com/LatestReleases/IDcypher.AES/AESAVS.pdf\" rel=\"nofollow noreferrer\">here.When using AES-128-CBC with the following parameters:<blockquote><pre><code>KEY = 00000000000000000000000000000000IV = 000...
Using OpenSSL to encrypt/decrypt a file?
security
2018-01-02T07:08:35.743
[ { "message": "I am working on an enterprise project and we have a upcoming new release. The security team runs a security scan, in that vulnerability report there is one point that I am struggling with. The project uses jQuery 1.4.x and it causes a XSS vulnerability, namely <a href=\"https://github.com/jquery/j...
Is there a base version of jQuery which has no XSS vulnerability?
security
2018-01-02T12:28:00.880
[ { "message": "I'am running a Ubuntu 16.04 on a luks encrypted disk. Normally when I leave my machine for some minutes, I always shut it down to be safe with the luks encryption. But I wonder, what the possible threats are if I would only log out of my Ubuntu session. I know, that an Ubuntu password can be reset...
How secure is my logged out but not shut down luks HD
security
2018-01-02T15:08:27.830
[ { "message": "Let me prefix my question with some information on our environment. We have a web server with 100+ websites. The web server has a corresponding MySQL Server version 5.7. Each PHP website has MySQL Database with a MySQL User attached to it that only has permissions set for it to be able to access t...
Are there potentential risks to allowing a PHP website MySQL User to have Create, Alter, and Drop Permissions
security
2018-01-02T20:35:55.033
[ { "message": "I have been using an SSD with no system-level encryption. If I now switch to full disk encryption using LUKS + LVM, do I effectively wipe the old data, or is it still hanging around until overwritten?", "role": "user" }, { "message": "It completely depends on your implementation (we do...
If I switch to LUKS on an SSD, have I just wiped it?
security
2018-01-03T11:08:44.680
[ { "message": "I'm struggling to understand what is an indicator of compromise.<br>I found different definitions on the web but I still don't know.<br>The definitions I found are:<br>1 - Something (file, network connection) that indicates a system has been compromised. <br>2 - An information about compromission"...
What is an indicator of compromise?
security
2018-01-03T18:11:27.357
[ { "message": "In Hydra-GTK, I've specified my target name as <code>https://example.com</code> (it's not www) and mentioned protocol as <code>https-post-form</code> and then entered username and password list and then I started.But I got this error message:<pre><code>Hydra (http://www.thc.org/thc-hydra) startin...
Getting [ERROR] Invalid target definition! while specifying https://mysitename.com in Hydra Gtk
security
2018-01-05T01:19:39.557
[ { "message": "I am new to openssl library and from what I could understand it is possible to generate large primes say 512 bit using the command line argument :<code>openssl prime -generate -bits 512</code>. But I am not sure how can I do this using a C code?I tried using <code>system()</code> command to genera...
Generate pair of large primes with openssl library in c
security
2018-01-05T04:29:31.253
[ { "message": "What criteria does a sandbox use to determine whether executing code (registry read/write) can be trusted or not ?", "role": "user" }, { "message": "A sandbox is an environment which restricts what the code can do. Such restrictions might for example limit file access to specific direc...
How does a sandbox module know the difference between trusted and untrusted code
security
2018-01-05T05:10:56.810
[ { "message": "Is there any material improvement/difference in BLE security controls/requirements in BLE 5.0 spec as compared to BLE 4.2 spec?I skimmed through the BLE bits in the huge Bluetooth 5.0 core spec but that didn't help.I am aware that there are significant security control improvements/additions in BL...
BLE 5.0 security vs. 4.2
security
2018-01-05T08:21:39.167
[ { "message": "I've read some informations on AES-256 crypting methods. But I'm still confused on what's the importance of the key length?Context: I want to crypt a 7Zip archive with the AES-256 option. And I'm wondering how long should my password be.I don't want to consider the ways of generating password here...
AES-256 Key Length Importance
security
2018-01-05T09:28:59.190
[ { "message": "I've read some informations on AES-256 crypting methods. But I'm still confused on what's the importance of the key length?Context: I want to crypt a 7Zip archive with the AES-256 option. And I'm wondering how long should my password be.I don't want to consider the ways of generating password here...
AES-256 Key Length Importance
security
2018-01-05T09:28:59.190
[ { "message": "I have been using node.js and running <a href=\"https://www.google.pt/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;uact=8&amp;ved=0ahUKEwjV-MWj48DYAhWC0xQKHfvlB9YQFggnMAA&amp;url=https%3A%2F%2Fwww.npmjs.com%2Fpackage%2Flive-server&amp;usg=AOvVaw24wbv41wTazpJruZTimoc...
Web Attack: CCTV-DVR Remote Code Execution (Node.js - Swedish string.js URL)
security
2018-01-05T12:42:00.523
[ { "message": "This is my first time running a vulnerability scan software like OpenVas. It is really a great tool to found out about vulnerabilities in the network.I have found difficult to troubleshoot the vulnerabilities related to weak cipher suites and protocols. For example, the OpenVas reports: <pre><code...
OpenVas remediation cipher suites
security
2018-01-05T20:44:40.893
[ { "message": "I have 200k sequences and each element of the sequence is vector of length 200. I plan to learn a HMM using this data, using the Baum-Welch EM algorithm to infer transition and emission probabilities. I wanted to know if I can do the fitting in batches of sequences(i.e. learn a HMM from say 1000 ...
Baum Welch training of HMM
stats
2017-04-24T14:14:09.257
[ { "message": "I have two variables: the number of employees who work from home in the firm and the number of independent contractors in the firm - and I have this data for 70 firms.I am trying to determine what statistical measure of association I can use to determine whether there is a relationship between the...
Is it logical to use correlation between percentages
stats
2017-04-24T14:50:59.537
[ { "message": "The heights of school desks have a normal distribution with mean $69$ cm and standard deviation $\\sigma$ cm. It is known that $15.5$% of these desks have a height greater than $70$ cm.$i)$ Find the value of $\\sigma$.How do I do this?", "role": "user" }, { "message": "I'll start you o...
Normal distribution find the standard deviation
stats
2017-04-24T18:24:37.093
[ { "message": "If I use a Jeffreys prior for a binomial probability parameter $\\theta$ then this implies using a $\\theta \\sim beta(1/2,1/2)$ distribution.If I transform to a new frame of reference $\\phi = \\theta^2$ then clearly $\\phi$ is not also distributed as a $beta(1/2,1/2)$ distribution.My question is...
Jeffreys prior for binomial likelihood
stats
2017-04-24T19:13:24.080
[ { "message": "I am randomly holding out 10% of data out of the whole dataset as test.data and train the GBM model on a remaining 90% of rows train.data (with x and y provided, no nfolds or validation data set provided )...Once I print it, the trained model - it shows auc measure of 1 or 0.999.But when I actuall...
How the Internal H2O auc measures are calculated? Why they are so close to 1 or 1?
stats
2017-04-24T21:54:12.137
[ { "message": "I've seen this mentioned numerous times, most recently in motivating the MCMC method and description of the Metropolis-Hastings algorithm. The text (Simulation and the Monte Carlo Method, Second Edition. By R.Y. Rubinstein and D. P. Kroese) says:<blockquote> An added advantage of MCMC is that it ...
What does it mean intuitively to know a pdf "up to a constant"?
stats
2017-04-24T23:07:19.500
[ { "message": "I have used correlation metric as distance measure for hierachical clustering and obtained the clusters. I used scikit (python 3.5) for clustering hierachical cluster.Now, I want to use another clustering algorithm with same dataset.I am not sure whether any other clustering algorithms will take c...
Does any other clustering algorithms take correlation as distance metric (apart from Hierachical)?
stats
2017-04-25T09:12:38.967
[ { "message": "I have some trouble understanding the definition of the EM-algorithm. On Wikipedia they write the following mathematical expression:$$ E_{Z|X,\\Theta^{(t)}}[\\log L(\\Theta^{(t)}; X, Z)|X=x] $$Now, let us rename $\\Theta^{(t)}$ to just $\\Theta$ and let us also recall that (yet) we do not want to ...
EM and (Gaussian) Mixture Models
stats
2017-04-25T12:44:16.390
[ { "message": "I'm reading Model selection and inference: Facts and fiction by Leeb &amp; Pötsher (2005) <a href=\"http://www.jstor.org/stable/pdf/3533623.pdf\" rel=\"nofollow noreferrer\">(link), in this paper they look at an example in linear regression:Let $$Y_i = \\alpha x_{i1}+\\beta x_{i2}+\\epsilon_i \\qq...
AIC and BIC criterion for Model selection, how is it used in this paper?
stats
2017-04-25T20:32:11.053
[ { "message": "I am accustom to using area under the curve (AUC) score to evaluate classification of binary distinctions, but it is not clear to me if there is value in evaluating the AUC score of a binary distinction with a predicted probability (of the class). The binary/binary case seems standard. Is it ever ...
Appropriate uses of the AUC score in evaluating a binary classifier
stats
2017-04-25T23:15:08.393
[ { "message": "My observation <code>y</code> is obtained from the model, $y(n) = \\sum_{i=0}^{p-1} r(i) x(n-i) + v(n)$ where <code>r</code> is the sparse channel coefficients, <code>x</code> is the one dimensional input and <code>v</code> is additive White Gaussian noise of zero mean. <code>y = filter(.)</code> ...
Help in Extending Least squares for sparse coefficients
stats
2017-04-26T03:21:16.780
[ { "message": "We want to sample from the distribution $P(\\theta \\mid X)$, which we only know up to a multiplicative constant. In Langvin MCMC, our Markov Chain is$$\\theta_{t+1} = \\theta_t + \\frac{\\epsilon_t}{2}\\left ( \\nabla P(\\theta_t) + \\sum_{i = 1}^n \\nabla P(x_i \\mid \\theta_t) \\right ) + \\sqr...
Does Langevin MCMC with decreasing step size require Metropolis-Hastings?
stats
2017-04-26T04:37:20.033
[ { "message": "I have a question regarding the interpretation of multiple dummy variables based on one categorical variable in a regression:Suppose I have a categorical variable called &lsquo;race&rsquo; which has four categories: white, black, Indian and Asian. For this categorical variable, I&rsquo;ve created ...
Interpretation of multiple dummy variables based on one categorical variable in a regression
stats
2017-04-26T06:58:46.797
[ { "message": "Suppose I have trained a random forest on a very high dimensional set of features. Then I have identified the top m features that have the highest Gini index. If I'd now drop all other feature variable except the top m ones (so performing a great dimensionality reduction), can I expect to obtain a...
Retaining Random Forest performance while reducing the feature set
stats
2017-04-26T10:07:39.000
[ { "message": "Given an integer observation $v$, I consider it comes from a Poisson distribution centered at $\\boldsymbol{\\theta}^T \\boldsymbol{\\lambda}$ where $\\boldsymbol{\\theta, \\lambda}$ are K-dimensional integer vectors.\\begin{align}v \\sim Poisson(\\sum_k\\theta_k\\lambda_k) &amp; \\quad\\text{ or ...
A distribution similar to a Negative Binomial of order k
stats
2017-04-26T11:16:07.643
[ { "message": "The two variables I am testing are:Indep: Class sizeDep: Performance (like test scores)The relationship between the variables appears to be nonlinear and the data is interval.Am I correct in thinking that I should be using a parametric test?What correlation test would you guys recommend using?", ...
What sort of correlation test is most appropriate in this situation?
stats
2017-04-26T20:57:35.410
[ { "message": "I have just gathered some data for an experiment I am doing for my research. There are two groups in my experiment. Each of them is shown a different prompt, and subsequently asked two questions. The first question has a yes'no answer, the second a yes/perhaps/no answer. I am trying to see if seei...
Using Spearman's rho to analyse results of an experiment
stats
2017-04-26T21:32:10.807
[ { "message": "Consider the random variables $X,Y,Z$.Assume$$X\\perp Z$$$$Y\\perp Z$$$$X\\perp Y$$Can we say $$(X,Y)\\perp Z$$My intuition is that we can't because$$p_{X,Y}=p_X\\times p_Y=p_{X|Z} \\times p_{Y|Z} \\neq p_{X,Y|Z}$$Could you provide also some example?Viceversa, suppose for some random variables $Q,...
Marginal independence does not imply joint independence
stats
2017-04-27T18:38:57.823