dialog
listlengths
4
30
title
stringlengths
15
150
category
stringclasses
14 values
dialog_time
stringdate
2016-01-21 01:59:30
2018-07-01 01:34:46
[ { "message": "I watched this movie around end of the 80s. One of the main characters (male) was driving some racing motorcycle which had like computer display board giving various information and feedback. I remember the biker had some guns and could perform various shooting acrobatics while driving the bike. T...
70's or 80's movie with motorcycle equipped with computer display and rifle holster
scifi
2018-01-05T19:06:37.043
[ { "message": "I read a novel as a teen about a girl who was trained by her scientist father to break 4th dimension. I remember isolation tanks and chess games were involved. The father really pushed his daughter through the experiments. There may have been a phrase like breaking through the wall or ...
Novel scientist's daughter breaks through to 4th dimension
scifi
2018-01-07T14:53:04.500
[ { "message": "In <a href=\"https://en.wikipedia.org/wiki/Marvel_1602\" rel=\"noreferrer\">Marvel 1602, Virginia Dare is the first child of the Roanoke Colony, who is brought to England along with her bodyguard Rojhaz. It turns out that when she is scared, she can shapeshift into a variety of animals, who are al...
Does Virginia Dare have an Earth-616 counterpart?
scifi
2018-01-08T01:41:06.867
[ { "message": "I am hoping someone can help me identify a book I have been trying to relocate for decades. There's a catch though: the three details I can remember about it may actually be conflated in my memory from two or even three different books.For a long time, I had it in my mind that this was one of Made...
Need help ID'ing a specific book (or books?) similar to A Wrinkle in Time
scifi
2018-01-11T20:21:20.213
[ { "message": "Assuming that everyone was already infected anyway, and the virus doesn't do anything until the host dies, what helped to kickstart the zombie apocalypse? Imo a society under martial law would've been able to handle zombies with a regular death rate, apparently too many people died too fast which ...
Walking Dead: what was the reason for massive initial death toll?
scifi
2018-01-11T23:16:17.140
[ { "message": "Why is the Prime Directive so important, when only Starfleet is bound by it? Private individuals and any non-Federation race or world can do whatever they please with respect to other worlds, regardless of Starfleet's Prime Directive. Certainly the Romulans and the Ferengi, just to name two of rac...
What's the big deal about the Prime Directive?
scifi
2018-01-14T02:52:17.173
[ { "message": "I think it was 2 years ago that I listened to an audio book or read this book.What I remember is a guy gets turned into a vampire after hooking with a girl. He doesn't realize he is a vampire and goes home. I also remember he can walk in the sun and after the girl gets killed by followers of the s...
Book series: guy becomes a vampire, creates portals to travel between different worlds to avenge the girl who turned him
scifi
2018-01-14T08:00:08.333
[ { "message": "I read a book in the late 90's about an American boy who becomes a rocket engineer for the ESA?He has an accident and some shrapnel lands in his brain and paralyses him then he goes for a ride around the moon in a ship he helped design.I particularly remember that the ships pilots were grateful th...
Book about a man who is a rocket engineer and ends up having his brain removed
scifi
2018-01-14T12:23:10.800
[ { "message": "I remember an episode, I think it was from The Twilight Zone or The Outer Limits.A scientist finds a rock.There is a world simulation happening on that rock, wherein grows a small simulation of our own evolution (by chance?) The rock is then put in a room, inside a glass.The scientist monitoring t...
Small world in a room with a ghost
scifi
2018-01-14T13:55:20.683
[ { "message": "I still have about 30 pages to go so maybe the story is resolved there but it has veered off to different plot strings. I am a huge fan of the book but can someone explain Wednesday's plan here:Plan a 50-100 year plan (create a god war/massacre) with elaborate preparations and whole lot of incredi...
The ending of American Gods makes no sense to me. Wednesday's plan
scifi
2018-01-15T07:47:39.370
[ { "message": "Whilst researching for <a href=\"https://scifi.stackexchange.com/a/179016/58193\">my answer to this related question: <a href=\"https://scifi.stackexchange.com/questions/129077/where-are-the-cast-and-crew-logos-in-game-of-thrones-opening-credits-from\">Where are the cast and crew logos in Game of ...
Why are the House sigils not "correct" in the title sequence for season 1?
scifi
2018-01-15T11:45:42.013
[ { "message": "In Star Trek (2009), original Spock meets alternate timeline Spock, Kirk, and Scott who look nothing like the Prime characters at that age. Later, in Star Trek Beyond (2016) , Spock views an image of Spock Prime and the Prime universe crew.The in-real-life cast members in TOS obviously look differ...
Does Abram-verse Trek acknowledge the different physical appearences of the crew?
scifi
2018-01-15T14:52:35.450
[ { "message": "I feel like I missed an important point at the beginning of the film. I remember Deckard initially denying the job but when he tries to walk out he says something to the effect of \"No choice then, huh?\" and the police chief confirms \"No choice.\"What did the police department have on Deckard th...
Why did Deckard have to terminate the replicants?
scifi
2018-01-16T17:35:57.470
[ { "message": "I am looking for a juvenile scifi published no later than 1961 (when I read it) about two boys--aged 13 and 15--traveling to the far side of the moon. Their father is part of a planned mission to the same destination, but they boys are taken there first by very tall aliens (abducted by them?) wh...
Looking for 50s or early 60s juvenile book about boys 13 and 15 going to other side of moon and saving a civilization there
scifi
2018-01-16T23:39:18.697
[ { "message": "The story of the book was taking place in a frozen planet where humans/ people essentially lived as nomads and there was a massive ?frozen? wall that a group had to traverse or follow. Food was scarce and they were constantly cold and had very little shelter.The book was published at least 12 year...
SF book - nomads on a frozen planet, journey to traverse/follow wall
scifi
2018-01-17T15:55:08.837
[ { "message": "We're told (if I recall correctly) that O'Neill's brain is more developed than most or all humans; we also know he has a natural Ancient gene in his DNA. That's presumably why he was able to somewhat use the knowledge the repository gave him; the second time even granted him the ability to use the...
Could the Ancient repository of knowledge have helped O'Neill to ascend?
scifi
2018-01-18T17:07:21.777
[ { "message": "Husband prepares car with essentials for nuclear meltdown in local facility in USA and need for fast getaway. Neighbour borrows wheel jack. Husband has spare so he isn't left without one. Family rush off when meltdown starts. Wife fiddles around delaying the need to leave urgently and wants to div...
Trying to recall name of survivalist post nuclear meltdown in USA science fiction short story. I know the plot
scifi
2018-01-19T09:11:37.590
[ { "message": "One of the well-known move of a speedster is phasing through solid materials.As mentioned <a href=\"http://dc.wikia.com/wiki/Category:Phasing\" rel=\"noreferrer\">here, <blockquote> Phasing is a term used to describe the ability of some characters to move through solid objects.</blockquote>And on...
Can speedsters phase through Kryptonians?
scifi
2018-01-19T15:12:55.570
[ { "message": "I'm trying to find the picture and from what episode but in the Legend Of Korra I believe Jinora was in the airbending temple and she comes across another Avatar.It displays an Avatar with black and white spirits going back and forth.I guess my question becomes what basis does this have? Is it im...
Does the good/evil avatar have a basis from any concept?
scifi
2018-01-20T04:39:36.633
[ { "message": "It's a Japanese anime movie. I watched this movie way back when. It was on a channel called Animax as a sci-fi marathon. This is what I roughly remember:<br>It's about this AI boy who has the memories/consciousness of a boy that passed away. The boy's parents put his consciousness in the AI so tha...
Story Identification for an anime movie from 2004-2005 in animax
scifi
2018-01-20T08:09:10.737
[ { "message": "Few days ago I was asking where to place the OpenVPN Access Server to provide network conectivity to LAN resources for remote users. While looking at the admin guide one of the few options is \"One Network Interface on Private Network Behind the Firewall\" In this configuration, it is required tha...
Port forwarding border router security
security
2016-12-30T22:49:00.520
[ { "message": "Lately, biometrics are being used for identity verification everywhere. e-Visas, Passports and even bank transactions (UUIDAI Aadhar system in India is now being used for identity verification, micro-payments, e.t.c.). I still can't understand how it can ever be secure. Here are some ways one coul...
How is Fingerprint Authentication Secure?
security
2016-12-31T06:46:08.297
[ { "message": "Rate my authentication scheme? (This feels simple enough to be a duplicate, but it's really hard to search for these types of questions. Sorry if it is a duplicate.)When a password is set, it's immediately hashed with a random salt <code>S1</code> and stored as <code>H1</code>.When a user tries to...
Double-hashing authentication scheme
security
2016-12-31T10:48:59.317
[ { "message": "A few minutes ago, there was a terror attack on a nightclub in Istanbul/Turkey(Thoughts and prayers to the victims and families), usually, the Government limits most of the communications apps traffic and they already block the most popular VPN services.However, this time they blocked the Telegram...
Can a Government block a specific app traffic, even with a VPN running?
security
2017-01-01T03:29:23.673
[ { "message": "I am currently doing a blackbox test on a web application for training purposes. It's a personal project.In addition to my manual testing process, I used an automated scanner for detecting obvious vulnerabilities. While this tool only found some basic issues, it also detected a potential SQLi vuln...
sqlmap injection point in POST data
security
2017-01-02T12:05:04.493
[ { "message": "According to <a href=\"https://blog.torproject.org/category/tags/hidden-services\" rel=\"nofollow noreferrer\">this, when you connect to a hidden service using tor you go through 6 nodes instead of 3... why? From what I understand when you connect to a website that is not a hidden service you conn...
Few Questions About Tor Hidden Services
security
2017-01-03T03:39:34.843
[ { "message": "I am downloading a PDF file, and would like to know how to diagnose security vulnerabilities in that file.Context:The last version of Google Chrome is giving me the following warning on a PDF download:<a href=\"https://i.stack.imgur.com/mrzsh.png\" rel=\"nofollow noreferrer\">Trying to learn more ...
Solutions to diagnose PDF files for exploits?
security
2017-01-03T04:33:04.553
[ { "message": "I've recently learned much more about Tor hidden service, thanks to <a href=\"https://security.stackexchange.com/questions/147068/few-questions-about-tor-hidden-services\">this post, and its answers. But I am still wondering about a few small tid-bits...As said in the linked post:Q: If a hidden se...
Tor Hidden Service In-Depth Questions
security
2017-01-03T17:31:29.917
[ { "message": "All my 2 factor authentication used to come from Google sms, but recently I've had the following numbers come up on my phone. I realise that to do this the person would need to have my phone number. I checked and this seems to be a number in canada. I did have a strange phone call from canada abou...
Google login 2 factor authentication sms -fake or real?
security
2017-01-03T19:22:00.563
[ { "message": "Facebook mobile app is often asking about my phone number for registration. It shows a screen saying that \"Keep your account secure and keep using it securely\" and \"We are trying to help you to secure your account .... register your phone number etc.\"And the suspicious side of this is that, th...
Facebook mobile app is often asking about my phone number for registeration, field is entered already. Where does facebook take this phone numbers?
security
2017-01-04T10:43:59.613
[ { "message": "I've never loved the idea of trusted X11 connections to shared machines. However, several years ago, we noticed that untrusted connections stopped working after a very short amount of time. After some digging, I found out that there's a \"ForwardX11Timeout\" setting that's set to a low-ish number;...
OpenSSH: Is setting a long ForwardX11Timeout better than ForwardX11Trusted?
security
2017-01-04T21:41:59.663
[ { "message": "I have a small portfolio site that I work on in my spare time as a way of demonstrating and applying what I have learned from school/work. Part of this demonstration involves me currently listing the repository as \"public\" on GitHub for anyone to see and browse. The reasoning behind this is that...
Should I host portfolio website in public GitHub repository?
security
2017-01-04T23:12:29.597
[ { "message": "When I run <pre><code>gpg --verify ~/file.asc ~/file</code></pre>I receive the following:<pre><code>gpg: Signature made Tue 10 Dec 2016 05:10:10 AM EST using RSA key ID abcdefghgpg: Good signature from \"Alias (signing key) &lt;john@alias.org&gt;\"gpg: WARNING: This key is not certified with a tru...
GPG why is my trusted key not certified with a trusted signature?
security
2017-01-06T04:39:24.547
[ { "message": "I am still in college. Recently, I completed my OSCP and have been asked by my professor to do a robust pentest on our University's Network Infrastructure.Although I agreed, I have no idea regarding what paperwork should I present the university authorities.(If any)A contract might look like an ov...
Pentest for my college
security
2017-01-06T16:19:13.943
[ { "message": "I'm doing a presentation about security/privacy on web and i would appreciate few hints about what would you talk about. Just general, nothing IT specific. I just wanna give a 1000 foot view on few topics and go deeper if I see interest. People should know about a threats on the web and also not j...
What should be people warned about?
security
2017-01-06T16:41:37.450
[ { "message": "I would like to create a SSO where my users can login to machines and wordpress (php) websites.So far I have LDAP with Kerberos working. I can login with the same credentials to every service, however I can't seem to avoid having to re-login when I move from one service or host to the next.It's ha...
SSO Understainding Credentials and Authentication
security
2017-01-07T00:38:49.380
[ { "message": "BackgroundI am implementing set of Micro services using Java spring MVC and hosted in Undertow containers using Gradle. I am using a Java keystore to secure my keys which are using by the service to perform encryption and signing. When a user spawning a Micro service, user injects the password int...
Securely store password for Java Keystore
security
2017-01-07T09:49:18.717
[ { "message": "I am looking for CPU, GPU and/or ASIC performance stats on hash performance. Specifically SHA256 and Argon2i. I've googled and only came up with very limited anecdotal evidence. Considering that this fast-changing field is so important for security managers, I would expect there to be a resource t...
Source for up-to-date GPU/ASIC hash performance?
security
2017-01-08T16:06:38.637
[ { "message": "When I connect to an HTTPS website on an online web browser such as <a href=\"https://www.browserling.com/\" rel=\"nofollow noreferrer\">https://www.browserling.com/, is my connection still secure, or will the online web browser I use be able to see my traffic? I am aware that HTTPS guarantees tha...
Is HTTPS secure when using an online web browser?
security
2017-01-09T01:07:11.550
[ { "message": "I am busy with security testing on a clients network and was asked to show how \"easy\" AV evasion is. I created a nice powershell reverse HTTPS file through veil-evasion, which is not detected by the Symantec virusscanner (testing with Norton Deluxe).So that was easy enough, but when I run it the...
Meterpreter HTTPS detected by IPS
security
2017-01-09T08:09:00.683
[ { "message": "Is this Public Key Infraestructure possible according with the <a href=\"https://tools.ietf.org/html/rfc6960#page-16\" rel=\"nofollow noreferrer\">RFC 6960 Online Certificate Status Protocol - OCSP, Authorized Responders?<a href=\"https://i.stack.imgur.com/1PSdK.png\" rel=\"nofollow noreferrer\">O...
Can an OCSP response be issued by a subca of the Root CA that has issued the certificate?
security
2017-01-09T10:02:50.103
[ { "message": "<pre><code>int play() { int a; int b; char buffer[010]; a = 0x41414141; b = 0x42424242; if (write(STDOUT_FILENO, \"For a moment, nothing happened. Then, after a second or so, nothing continued to happen.\\n&gt; \", 91) &lt; 0) { perror(\"write\"); } if (read(STDIN_FI...
Buffer Overflow: Advice on exploiting
security
2017-01-10T00:11:45.327
[ { "message": "Well the title kinda ask all, I've been using DriveDroid on Android to emulate a read-only USB drive that I can plug in any machines to copy the files to the PC. I do use the same USB cable.For attacks like BadUSB is that safer? I would think not, but are they common enough in the wild to worry ab...
Is Android ( Linux ) emulating a read-only USB storage device safer than a USB drive?
security
2017-01-10T02:13:48.613
[ { "message": "As far as i understand, <pre><code>Master_key = PRF(\"pre_master_key\", client.random, server.random)</code></pre>Session keys and other keys derived from Master_key, Client.Random and Server.Random.After session resumption, Master_key will be same as i know. Will session keys and other key again ...
Derivation of session keys from master_secrets during session resumption
security
2017-01-10T11:41:53.987
[ { "message": "I have a hierarchy of certificates which contains:<code>root-cert</code><code>server1-CA</code> (issued from <code>root-CA</code>)<code>client1-cert</code> (issued from <code>server1-CA</code>)<code>server2-CA</code> (issued from <code>root-CA</code>) <code>client2-cert</code> (issued from <code>...
Can we use one CA to revoke certificates generated by another CA?
security
2017-01-11T14:57:17.637
[ { "message": "My friend got infected by \"Marlboro\" Ransomware (description of the nasty thing: <a href=\"http://sensorstechforum.com/marlboro-ransomware-remove-restore-oops-files/\" rel=\"nofollow noreferrer\">http://sensorstechforum.com/marlboro-ransomware-remove-restore-oops-files/).I have researched online...
Affected by Marlboro Ransomware (".oops" extension) - Which decryptor to use to decrypt the files?
security
2017-01-12T17:43:51.873
[ { "message": "I have a port forwarding rule sending 23 traffic to a \"honeypot\" (called \"comp\" below). Throughout the night, many bots from around the world attempted to connect, but there was no service running.Now, I wrote a C program that just binds to 23, accepts a connection, and exits. When a bot scans...
Why aren't telnet bots finishing the three-way handshake?
security
2017-01-12T21:17:09.683
[ { "message": "Do 3rd party cookies open up the possibility of CSRF where it may not exist? I was looking at a <a href=\"https://www.sjoerdlangkemper.nl/2016/04/14/preventing-csrf-with-samesite-cookie-attribute/\" rel=\"nofollow noreferrer\">blog post as well as an <a href=\"https://tools.ietf.org/html/draft-wes...
Third-Party cookies and CSRF
security
2017-01-13T16:07:43.040
[ { "message": "I would like to test a model for preventing information leakage in an environment that consist of the following:a group of senders of emails or messagesa group of receivers of the emails of messagesa set of connections established between the users of the two groups aforementionedI found that the ...
public database available for testing email security proposal?
security
2017-01-14T14:59:24.550
[ { "message": "Some antivirus software MitMs, or through other methods, HTTPS connections in order to scan for malware, for example, Avast, and maybe other vendors too.Is the method they (let's say Avast as an example) use secure? Is their claim that the data never leaves my computer true?Should HTTPS connection...
Should antivirus HTTPS scanning be left on? Is it secure?
security
2017-01-15T00:23:09.820
[ { "message": "Do all email servers (also different providers) that implement tls, use tls to encrypt the messages and headers?Could the missing of tls-encryption be a sign of ssl-downgrading and how to find out if a server does implement tls?", "role": "user" }, { "message": "<blockquote> Do all em...
How is the exchange of tls on email servers?
security
2017-01-15T15:12:02.390
[ { "message": "A few days ago, an old \"vulnerability\" of WhatsApp re-appeared in the media.The Guardian published <a href=\"https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages\" rel=\"noreferrer\">this article calling the vulnerability a \"backdoor\". The ...
Attack vector for exploiting WhatsApp's retransmission "vulnerability"?
security
2017-01-15T22:28:47.860
[ { "message": "The head of Information and Communication Technologies Authority of Turkey said this on <a href=\"https://twitter.com/ofatihsayan/status/820372561485766656\" rel=\"nofollow noreferrer\">Twitter yesterday:<blockquote> WhatsApp can read your end to end encrypted messages when necessary. It can decr...
Does WhatsApp have a golden key to decrypt messages?
security
2017-01-16T05:37:48.490
[ { "message": "I am not a security expert, and unfortunately we are too small company to have one. Since I am in charge of completing PCI DSS self-assessment questionnaires, I was shocked with the amount of questions specified.First couple of questions are about firewall, network topology, routers etc, etc. Sinc...
Are SAQ A-EP network questions office network or a web server network?
security
2017-01-16T14:42:49.443
[ { "message": "When I run a nmap scan against a remote target, it shows port 25 closed but an online nmap tool like (<a href=\"https://hackertarget.com/nmap-online-port-scanner/\" rel=\"nofollow noreferrer\">https://hackertarget.com/nmap-online-port-scanner/) shows that port 25 is open.<pre><code> sudo nmap -sS ...
System nmap shows port closed but online nmap tool shows port open
security
2017-01-16T15:58:32.487
[ { "message": "I have client and server code for different SSL implementations like, openssl, wolf ssl, matrix ssl and I want to benchmark these implementation based on: Influence of symmetric key generation frequency. Influence of CPU performance. Influence of the asymmetric key size. Influence of the object si...
SSL benchmarking For Openssl
security
2017-01-17T10:38:44.970
[ { "message": "I'd like to secure my application's traffic using TLS with pre-distributed self-signed certificates (as a drop-in replacement of plain TCP).In some cases, two clients won't be able to talk to each other directly because of presence of NAT and will have to resort to an accessible relay to tunnel th...
Is it sensible to tunnel TLS traffic over another TLS?
security
2017-01-18T13:05:52.853
[ { "message": "I'm running a packet capture on my test client (running in managed mode) and also on my attacking machine (running in monitor mode). It is my understanding that 802.11 networks using WEP encryption do not encrypt ARP packets. This would make sense, as I need to capture an ARP packet in order to pe...
Wireless - why can't i view ARP broadcasts in monitor mode on encrypted networks?
security
2017-01-18T14:36:33.163
[ { "message": "In a web-application the session time-out is not defined neither in the application nor in the application configuration. But the default time out is taken from the IIS. what is the security issue if the session time-out is default IIS server session value? Does issue vary from IIS to web sphere?"...
what is the security issue if session time out is the default value from server configuration?
security
2017-01-19T17:18:18.740
[ { "message": "Scenario is: attacker is disconnecting devices using <code>aireplay --deauth</code> command on AP so none of my devices are connecting to AP. Then what do I do now when none of my device is connected to AP?", "role": "user" }, { "message": "Fighting interference is difficult. These fre...
How to connect to AP when attacker is deauth'ing my device?
security
2017-01-19T18:03:05.317
[ { "message": "Update: Now Chrome rejects this website for me.It seems the trusting is just cached somewhere?<br>I guess this question isn't as interesting as I thought, but it'd be nice if someone could clarify it.Original question:I've disabled automatic certificate updating, removed the root certificate, and ...
Why does Chrome tell me this certificate is valid when it can't be verified?
security
2017-01-19T20:01:06.380
[ { "message": "I have a server that implements DTLS using OpenSSL 1.0.1 but supports only RSA keys as of today. I want to add support to this server to accept EC keys to be able to implement the newer ECDHE-ECDSA cipher suites while retaining support for RSA. Any pointers as to how to go about this? All my searc...
Server with support for both EC and RSA keys
security
2017-01-20T23:49:54.233
[ { "message": "If i'm correct, due ASLR we load libc into some random address. And then in order to make that happen without allowing write permissions of text pages within memory we use plt/got. Now I can simply jump back into some libc@plt function that is well-known before execution of the program and pretty ...
Is ASLR useless in preventing attacks such as return-to-libc in linux?
security
2017-01-21T13:58:53.860
[ { "message": "I was wondering in the Chaskey, when the message <code>m</code> is split into fixed size blocks such as <code>m1,m2,m3....ml</code>, what would be the size of each message block?Is it 128 bits each or it can be of any variable size?m=m1||m2||m3||...||ml", "role": "user" }, { "message":...
Chaskey - LightWeight MAC algorithm
security
2017-01-21T23:07:54.257
[ { "message": "I'm working on a new project that encrypts folders on my personal computer.No sending of files are involved(networking). It is only for protection and security. Is it possible to combine RSA and AES for encrypting/decrypting folders with the use of password? (This is only for research purposes)",...
Is it possible to combine RSA and AES?
security
2017-01-21T23:58:05.860
[ { "message": "I noticed K-9 Mail (Android), Geary, Sylpheed and Thunderbird are leaking my personal and private IP in the email headers.I know web clients like gmail don't suffer from this problem. But what can I do to avoid my IP leaking while using desktop/mobile apps. Are there any options/configurations ava...
Email Client STMP Personal IP Leak
security
2017-01-23T04:24:06.720
[ { "message": "Can someone elaborate on the attacks alluded to in this paragraph from the W3C <a href=\"https://www.w3.org/TR/SRI/#is-response-eligible-for-integrity-validation\" rel=\"nofollow noreferrer\">SubResource Integrity spec?<blockquote> In order to mitigate an attacker’s ability to read data cross-ori...
What attacks are mitigated by requiring CORS for subresource integrity verification?
security
2017-01-23T04:31:18.750
[ { "message": "I think in a PHP file upload it is a best practice to store files outside of the document root with a randomly generated file name and telling the server to make them non-executable, so the file will not be executed by an attempt to access the file via HTTP.If storing them outside the root and pre...
Changing file extensions in PHP file upload to prevent code execution?
security
2017-01-23T15:13:53.780
[ { "message": "Okay, so I am basically an electronics student so I have limited knowledge on the subject. So please help me out here. The thing is that one day, as I was browsing, I opened up Google and instead of the Google logo, a \"You have been hacked\" image came up. I share a flat with 5 people and one of...
How to stop the "mitmf" tool on my home network?
security
2017-01-24T15:21:05.470
[ { "message": "I have a web application, say <code>http://web.app/</code>. It is local for every given user and accessible without authorisation. It uses an API of a service <code>https://service.app/</code>. The user can log in to it and see his API key. The user just copy-pastes it from the service to the app ...
Do I need OAuth to pass an API key of a service (now it is passed via copy-paste)?
security
2017-01-24T15:57:27.243
[ { "message": "The current setup is the following:A production server (host) has only a few open ports, namely HTTP, HTTPS and secure ports for e-mailing.On the host there is a non-privileged user running a Docker engine and containers.Several web applications are running on Docker containers, each runs on a vir...
Is it a good practice to proxy web-applications from Docker containers?
security
2017-01-24T17:13:08.813
[ { "message": "By my understanding of how VPN's work the answer is no because the VPN doesn't reveal the source IP is from AWS. But, I asked this question on Quora and everyone is saying they can still see the AWS source IP address. <a href=\"https://www.quora.com/If-an-AWS-machine-accesses-something-with-a-VPN-...
If I use an AWS machine to connect to "Website ABC" through VPN, will "Website ABC" know I'm connecting from an AWS machine?
security
2017-01-24T23:53:12.157
[ { "message": "Im trying to set up a fake AP using aircrack-ng suite, DHCP server &amp; iptables.After creating the fake AP: <pre><code>airmon-ng start wlan1airbase-ng -c 11 -e \"freewifi\" wlan1mon</code></pre><a href=\"https://i.stack.imgur.com/Kp5Dd.jpg\" rel=\"nofollow noreferrer\">running iptables configura...
Setting up a fake AP - problem with iptables and DNS server
security
2017-01-26T13:01:58.173
[ { "message": "If one knows that a certain WPA2 CCMP encrypted network uses a password that is 16 characters and only numbers and uppercase letters (ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890) and has a handshake from that network does that make it possible to crack the password in a plausible amount of time? I know i...
Possibility Of Cracking WPA Password with Additional Information
security
2017-01-26T14:56:38.337
[ { "message": "Two properly placed $200 HD cameras are able to make close pictures of both sides of a credit card used while shopping. When you insert the card to the card reader, both sides get exposed, including the credit card number, name, expiry, CVC. That's far enough to get your money stolen.I think this ...
Protect credit card from spying eyes
security
2017-01-26T14:58:43.473
[ { "message": "Countries such as China are known for blocking VPN connections, which causes a lot frustration for residents and temporary visitors alike. However China doesn't (yet) apply a white-list mode to outgoing traffic, so it's possible to connect to any regular website that is not on the ban list.So why ...
Why don't secure tunnels (such as VPN) mask themselves as an HTTPS stream? Wouldn't this make it impossible to block them?
security
2017-01-29T13:29:55.367
[ { "message": "I wasn't sure whether to ask this on crypto or security, but since it involves real-world trust and services, I figured this is the better place.Consider that me and my friends (whom for the purposes of this question I do not trust) want to lock in a random number that only becomes available at a ...
Good publicly available unpredictable random number sources?
security
2017-01-29T14:32:42.297
[ { "message": "I'm interested in finding out what is the best method to enter sensitive information somewhere given an insecure computer.Granted, I know that if the computer has a keylogger or some other malware that captures input, there are much more important things that I should worry about (for example what...
How to enter sensitive information securely?
security
2017-01-30T04:35:57.573
[ { "message": "I have tried to understand CVE-1999-0524.It is recommended to configure the firewall to prevent ICMP timestamp responses: <a href=\"https://access.redhat.com/security/cve/cve-1999-0524\" rel=\"nofollow noreferrer\">https://access.redhat.com/security/cve/cve-1999-0524What if I will not do it?What i...
What is implication of ICMP timestamp responses?
security
2017-01-30T14:52:34.943
[ { "message": "I have a scenario. I want to scan a web app which is placed in another DC behind a different firewall(not web application firewall). We can have open ports to reach the application. The tools generally used by testers is Acunetix, Appscan, burp and webinspect. The Web server is not behind a PAT or...
Web App Scans scans through the network firewall?
security
2017-01-31T05:48:12.823
[ { "message": "I am using an Samsung S7 edge; together with IBM Maas360; and I ran into a an interesting situation.Prior last week, my S7 was running Android 6. Android can be configured to ask for your password before the system starts. By default, the device will start the OS, and later on, when the OS is up a...
How does Android 6 full encryption work ... when it doesn't ask for the password at start time?
security
2017-01-31T12:16:45.560
[ { "message": "I have heard that the EAP protocol has authentication capabilities for wireless networks too. But I am not able to get how it is deployed in real time as I know that whenever I need to connect to my router, I just type in the password and it's done but where EAP in that?", "role": "user" }, ...
In Real-Time, where do we deploy Extensible Authentication Protocol(EAP) in Wireless Networks?
security
2017-01-31T15:32:05.990
[ { "message": "I am designing a workflow for issuing and acquiring of voucher cards for a client and the chosen technology for the cards has been mifare desfire.I have a lot of experience with credit cards and we want to make the technology as POS friendly as possible, so the acquiring process could be made as s...
Securing authenticity of mifare cards, protection against cloning
security
2017-02-01T13:34:11.573
[ { "message": "I am attempting to conduct a deauthentication attack on a stand alone AP using Aircrack-ng. Im using an ASUS 802.11ac router and using aireplay-ng to send the deauthentication packets. But when conducting the attack whilst the router has any form of security enabled, WPA/WPA2, the deauthentication...
Stations not deauthenticating when using Aircrack-ng
security
2017-02-01T16:09:01.493
[ { "message": "An e-commerce website uses LAMP stack hosted on a single rack-mounted server located at a data center. On every transaction, credit card information is stored in the MySQL database at data center. For accounting purposes transaction records (including credit card information) is transmitted in sta...
single secure architecture solution for below 4 threats
security
2017-02-01T18:17:10.403
[ { "message": "What is the message flow, or sequence that enables JWT encryption of the payload? (opposed to OAuth / OpenIDConnect which doesn't encrypt the payload)", "role": "user" }, { "message": "Short answer: <a href=\"https://tools.ietf.org/html/rfc7516\" rel=\"nofollow noreferrer\">RFC 7516Lon...
How does JWT Encryption work?
security
2017-02-02T05:00:01.330
[ { "message": "ASP.NET includes a request validation system that halts page processing if any of the following characters are present in the path portion of the URL <code>&lt; &gt; * % &amp; : \\ ?</code>. Instead of the normal page, the runtime returns an error page which says<blockquote> A potentially danger...
What specifically is "potentially dangerous" about an ampersand in a URL
security
2017-02-02T11:47:54.863
[ { "message": "Context: A website is hosted on multiple dedicated servers. There are frontend webservers, backend DB servers and other servers between them.The DB holds user's accounts passwords. All connections are secure and the registration/login pages can not be bruteforced (out of the question's range).Thre...
Hashed passwords storage: iterations vs entropy
security
2017-02-02T15:47:21.443
[ { "message": "What is the right way to escape bad data the var \"<code>$actuallinkk</code>\" inside this java script <pre><code>&lt;a href=\"javascript:reportUser(\\''.$actuallinkk.'&amp;act=inviteadmin\\')\"&gt;Invite Consultant to this conversation&lt;/a&gt;</code></pre>this is what i did below, i don't know ...
What is the proper way to escape bad data from link in javascript against xss
security
2017-02-02T16:17:51.197
[ { "message": "I was recently going through the group policy editor in Windows. There is in an option of storing passwords with reversible encryption.But in InfoSec, we always say that we should store passwords in such a way that it cannot be reverse engineered.But why is that option there? any specific need or ...
Why is the Store Passwords with reversible encryption option even there?
security
2017-02-02T16:46:59.707
[ { "message": "When you enable BitLocker, there is a period of time where BitLocker is slowly encrypting the contents of the drive in the background. During this time, is it guaranteed that new data written to the disk will be encrypted as it is written? Or is it possible that it will be written to the unencrypt...
Will new data written to disk while BitLocker is encrypting the disk be encrypted?
security
2017-02-02T22:38:41.463
[ { "message": "I have a site. My site does not have any cookies. It is developed with Drupal 8(CMS) and have few articles. Just for a curiosity I did check whether my website uses cookies or not. I did use Firefox to check.The Firefox message box showed that, your site is using cookies as shown below. What this ...
What is the purpose of this cookie?
security
2017-02-04T06:47:52.253
[ { "message": "I am building a WebRTC application, and really concerned about security.I have read this quite interesting article : <a href=\"https://webrtc-security.github.io\" rel=\"nofollow noreferrer\">https://webrtc-security.github.ioAs I am far from being an expert in networking security, I just want to co...
WebRTC security & encryption
security
2017-02-04T14:32:56.157
[ { "message": "Our university teachers have given us a challenge and they will increase every student grades by 2 points if even one of us succeed.The challenge : They have built a website using modern technologies (HTML5/JavaScript) and \"all\" we have to do is getting access to the database that is behind it a...
Hacking Challenge
security
2017-02-04T22:23:37.263
[ { "message": "I am preparing a project for a client. It is a wireless device to be used inside a factory so the workers can interact with the factory without having to go to a terminal. In order to connect the device to the system easily I see two main possibilities: Bluetooth or Wi-Fi.The client prefers to use...
Security of Wi-Fi vs Bluetooth
security
2017-02-05T12:48:29.580
[ { "message": "My school's wifi network is open, but requires a login with student account name/password in the browser.What confuses me is that it asks for this login every time the network is accessed (or every few hours while continuously connected). Is there a reason it has to do that? Why can't the network ...
Why should I need to sign in to a (school) wifi network every time?
security
2017-02-05T18:59:48.863
[ { "message": "Is it valid to use X-Frame-Options:DENYX-Frame-Options:SAMEORIGINin the response header together? Or should only either one be present?", "role": "user" }, { "message": "It's not valid and it wouldn't make logical sense, because DENY blocks everything that SAMEORIGIN does and more.Addi...
X-Frame-Options question
security
2017-02-06T04:17:16.507
[ { "message": "Assuming I'm working on an environment that currently uses MD5 to hash passwords, and I want to switch to something more secure. I already heard of bcrypt, but I had another idea.Would it be possible to use RSA2048 to hash passwords if I just threw away the private key of the key pair?If so, is th...
Can you use RSA2048 to hash passwords?
security
2017-02-08T08:34:43.180
[ { "message": "I have been going through the <a href=\"https://www.ncsc.gov.uk/documents/cyber-essentials-common-questionnaire\" rel=\"nofollow noreferrer\">cyber essentials questionnaire and this one question is confusing me and I wondered if you could provide any insight into it for me.in one of the 5 sections...
boundary firewall cyber essentials question
security
2017-02-08T12:56:56.527
[ { "message": "I am trying to generate a private-public key pair and convert the public key into a certificate which can be added into my truststore.To generate private &amp; public key: <code>openssl rsa -in private.pem -outform PEM -pubout -out public_key.pem</code>Now I am trying to convert this to a certific...
Expecting: TRUSTED CERTIFICATE while converting pem to crt
security
2017-02-08T17:30:28.480