dialog listlengths 4 30 | title stringlengths 15 150 | category stringclasses 14 values | dialog_time stringdate 2016-01-21 01:59:30 2018-07-01 01:34:46 |
|---|---|---|---|
[
{
"message": "I watched this movie around end of the 80s. One of the main characters (male) was driving some racing motorcycle which had like computer display board giving various information and feedback. I remember the biker had some guns and could perform various shooting acrobatics while driving the bike. T... | 70's or 80's movie with motorcycle equipped with computer display and rifle holster | scifi | 2018-01-05T19:06:37.043 |
[
{
"message": "I read a novel as a teen about a girl who was trained by her scientist father to break 4th dimension. I remember isolation tanks and chess games were involved. The father really pushed his daughter through the experiments. There may have been a phrase like breaking through the wall or ... | Novel scientist's daughter breaks through to 4th dimension | scifi | 2018-01-07T14:53:04.500 |
[
{
"message": "In <a href=\"https://en.wikipedia.org/wiki/Marvel_1602\" rel=\"noreferrer\">Marvel 1602, Virginia Dare is the first child of the Roanoke Colony, who is brought to England along with her bodyguard Rojhaz. It turns out that when she is scared, she can shapeshift into a variety of animals, who are al... | Does Virginia Dare have an Earth-616 counterpart? | scifi | 2018-01-08T01:41:06.867 |
[
{
"message": "I am hoping someone can help me identify a book I have been trying to relocate for decades. There's a catch though: the three details I can remember about it may actually be conflated in my memory from two or even three different books.For a long time, I had it in my mind that this was one of Made... | Need help ID'ing a specific book (or books?) similar to A Wrinkle in Time | scifi | 2018-01-11T20:21:20.213 |
[
{
"message": "Assuming that everyone was already infected anyway, and the virus doesn't do anything until the host dies, what helped to kickstart the zombie apocalypse? Imo a society under martial law would've been able to handle zombies with a regular death rate, apparently too many people died too fast which ... | Walking Dead: what was the reason for massive initial death toll? | scifi | 2018-01-11T23:16:17.140 |
[
{
"message": "Why is the Prime Directive so important, when only Starfleet is bound by it? Private individuals and any non-Federation race or world can do whatever they please with respect to other worlds, regardless of Starfleet's Prime Directive. Certainly the Romulans and the Ferengi, just to name two of rac... | What's the big deal about the Prime Directive? | scifi | 2018-01-14T02:52:17.173 |
[
{
"message": "I think it was 2 years ago that I listened to an audio book or read this book.What I remember is a guy gets turned into a vampire after hooking with a girl. He doesn't realize he is a vampire and goes home. I also remember he can walk in the sun and after the girl gets killed by followers of the s... | Book series: guy becomes a vampire, creates portals to travel between different worlds to avenge the girl who turned him | scifi | 2018-01-14T08:00:08.333 |
[
{
"message": "I read a book in the late 90's about an American boy who becomes a rocket engineer for the ESA?He has an accident and some shrapnel lands in his brain and paralyses him then he goes for a ride around the moon in a ship he helped design.I particularly remember that the ships pilots were grateful th... | Book about a man who is a rocket engineer and ends up having his brain removed | scifi | 2018-01-14T12:23:10.800 |
[
{
"message": "I remember an episode, I think it was from The Twilight Zone or The Outer Limits.A scientist finds a rock.There is a world simulation happening on that rock, wherein grows a small simulation of our own evolution (by chance?) The rock is then put in a room, inside a glass.The scientist monitoring t... | Small world in a room with a ghost | scifi | 2018-01-14T13:55:20.683 |
[
{
"message": "I still have about 30 pages to go so maybe the story is resolved there but it has veered off to different plot strings. I am a huge fan of the book but can someone explain Wednesday's plan here:Plan a 50-100 year plan (create a god war/massacre) with elaborate preparations and whole lot of incredi... | The ending of American Gods makes no sense to me. Wednesday's plan | scifi | 2018-01-15T07:47:39.370 |
[
{
"message": "Whilst researching for <a href=\"https://scifi.stackexchange.com/a/179016/58193\">my answer to this related question: <a href=\"https://scifi.stackexchange.com/questions/129077/where-are-the-cast-and-crew-logos-in-game-of-thrones-opening-credits-from\">Where are the cast and crew logos in Game of ... | Why are the House sigils not "correct" in the title sequence for season 1? | scifi | 2018-01-15T11:45:42.013 |
[
{
"message": "In Star Trek (2009), original Spock meets alternate timeline Spock, Kirk, and Scott who look nothing like the Prime characters at that age. Later, in Star Trek Beyond (2016) , Spock views an image of Spock Prime and the Prime universe crew.The in-real-life cast members in TOS obviously look differ... | Does Abram-verse Trek acknowledge the different physical appearences of the crew? | scifi | 2018-01-15T14:52:35.450 |
[
{
"message": "I feel like I missed an important point at the beginning of the film. I remember Deckard initially denying the job but when he tries to walk out he says something to the effect of \"No choice then, huh?\" and the police chief confirms \"No choice.\"What did the police department have on Deckard th... | Why did Deckard have to terminate the replicants? | scifi | 2018-01-16T17:35:57.470 |
[
{
"message": "I am looking for a juvenile scifi published no later than 1961 (when I read it) about two boys--aged 13 and 15--traveling to the far side of the moon. Their father is part of a planned mission to the same destination, but they boys are taken there first by very tall aliens (abducted by them?) wh... | Looking for 50s or early 60s juvenile book about boys 13 and 15 going to other side of moon and saving a civilization there | scifi | 2018-01-16T23:39:18.697 |
[
{
"message": "The story of the book was taking place in a frozen planet where humans/ people essentially lived as nomads and there was a massive ?frozen? wall that a group had to traverse or follow. Food was scarce and they were constantly cold and had very little shelter.The book was published at least 12 year... | SF book - nomads on a frozen planet, journey to traverse/follow wall | scifi | 2018-01-17T15:55:08.837 |
[
{
"message": "We're told (if I recall correctly) that O'Neill's brain is more developed than most or all humans; we also know he has a natural Ancient gene in his DNA. That's presumably why he was able to somewhat use the knowledge the repository gave him; the second time even granted him the ability to use the... | Could the Ancient repository of knowledge have helped O'Neill to ascend? | scifi | 2018-01-18T17:07:21.777 |
[
{
"message": "Husband prepares car with essentials for nuclear meltdown in local facility in USA and need for fast getaway. Neighbour borrows wheel jack. Husband has spare so he isn't left without one. Family rush off when meltdown starts. Wife fiddles around delaying the need to leave urgently and wants to div... | Trying to recall name of survivalist post nuclear meltdown in USA science fiction short story. I know the plot | scifi | 2018-01-19T09:11:37.590 |
[
{
"message": "One of the well-known move of a speedster is phasing through solid materials.As mentioned <a href=\"http://dc.wikia.com/wiki/Category:Phasing\" rel=\"noreferrer\">here, <blockquote> Phasing is a term used to describe the ability of some characters to move through solid objects.</blockquote>And on... | Can speedsters phase through Kryptonians? | scifi | 2018-01-19T15:12:55.570 |
[
{
"message": "I'm trying to find the picture and from what episode but in the Legend Of Korra I believe Jinora was in the airbending temple and she comes across another Avatar.It displays an Avatar with black and white spirits going back and forth.I guess my question becomes what basis does this have? Is it im... | Does the good/evil avatar have a basis from any concept? | scifi | 2018-01-20T04:39:36.633 |
[
{
"message": "It's a Japanese anime movie. I watched this movie way back when. It was on a channel called Animax as a sci-fi marathon. This is what I roughly remember:<br>It's about this AI boy who has the memories/consciousness of a boy that passed away. The boy's parents put his consciousness in the AI so tha... | Story Identification for an anime movie from 2004-2005 in animax | scifi | 2018-01-20T08:09:10.737 |
[
{
"message": "Few days ago I was asking where to place the OpenVPN Access Server to provide network conectivity to LAN resources for remote users. While looking at the admin guide one of the few options is \"One Network Interface on Private Network Behind the Firewall\" In this configuration, it is required tha... | Port forwarding border router security | security | 2016-12-30T22:49:00.520 |
[
{
"message": "Lately, biometrics are being used for identity verification everywhere. e-Visas, Passports and even bank transactions (UUIDAI Aadhar system in India is now being used for identity verification, micro-payments, e.t.c.). I still can't understand how it can ever be secure. Here are some ways one coul... | How is Fingerprint Authentication Secure? | security | 2016-12-31T06:46:08.297 |
[
{
"message": "Rate my authentication scheme? (This feels simple enough to be a duplicate, but it's really hard to search for these types of questions. Sorry if it is a duplicate.)When a password is set, it's immediately hashed with a random salt <code>S1</code> and stored as <code>H1</code>.When a user tries to... | Double-hashing authentication scheme | security | 2016-12-31T10:48:59.317 |
[
{
"message": "A few minutes ago, there was a terror attack on a nightclub in Istanbul/Turkey(Thoughts and prayers to the victims and families), usually, the Government limits most of the communications apps traffic and they already block the most popular VPN services.However, this time they blocked the Telegram... | Can a Government block a specific app traffic, even with a VPN running? | security | 2017-01-01T03:29:23.673 |
[
{
"message": "I am currently doing a blackbox test on a web application for training purposes. It's a personal project.In addition to my manual testing process, I used an automated scanner for detecting obvious vulnerabilities. While this tool only found some basic issues, it also detected a potential SQLi vuln... | sqlmap injection point in POST data | security | 2017-01-02T12:05:04.493 |
[
{
"message": "According to <a href=\"https://blog.torproject.org/category/tags/hidden-services\" rel=\"nofollow noreferrer\">this, when you connect to a hidden service using tor you go through 6 nodes instead of 3... why? From what I understand when you connect to a website that is not a hidden service you conn... | Few Questions About Tor Hidden Services | security | 2017-01-03T03:39:34.843 |
[
{
"message": "I am downloading a PDF file, and would like to know how to diagnose security vulnerabilities in that file.Context:The last version of Google Chrome is giving me the following warning on a PDF download:<a href=\"https://i.stack.imgur.com/mrzsh.png\" rel=\"nofollow noreferrer\">Trying to learn more ... | Solutions to diagnose PDF files for exploits? | security | 2017-01-03T04:33:04.553 |
[
{
"message": "I've recently learned much more about Tor hidden service, thanks to <a href=\"https://security.stackexchange.com/questions/147068/few-questions-about-tor-hidden-services\">this post, and its answers. But I am still wondering about a few small tid-bits...As said in the linked post:Q: If a hidden se... | Tor Hidden Service In-Depth Questions | security | 2017-01-03T17:31:29.917 |
[
{
"message": "All my 2 factor authentication used to come from Google sms, but recently I've had the following numbers come up on my phone. I realise that to do this the person would need to have my phone number. I checked and this seems to be a number in canada. I did have a strange phone call from canada abou... | Google login 2 factor authentication sms -fake or real? | security | 2017-01-03T19:22:00.563 |
[
{
"message": "Facebook mobile app is often asking about my phone number for registration. It shows a screen saying that \"Keep your account secure and keep using it securely\" and \"We are trying to help you to secure your account .... register your phone number etc.\"And the suspicious side of this is that, th... | Facebook mobile app is often asking about my phone number for registeration, field is entered already. Where does facebook take this phone numbers? | security | 2017-01-04T10:43:59.613 |
[
{
"message": "I've never loved the idea of trusted X11 connections to shared machines. However, several years ago, we noticed that untrusted connections stopped working after a very short amount of time. After some digging, I found out that there's a \"ForwardX11Timeout\" setting that's set to a low-ish number;... | OpenSSH: Is setting a long ForwardX11Timeout better than ForwardX11Trusted? | security | 2017-01-04T21:41:59.663 |
[
{
"message": "I have a small portfolio site that I work on in my spare time as a way of demonstrating and applying what I have learned from school/work. Part of this demonstration involves me currently listing the repository as \"public\" on GitHub for anyone to see and browse. The reasoning behind this is that... | Should I host portfolio website in public GitHub repository? | security | 2017-01-04T23:12:29.597 |
[
{
"message": "When I run <pre><code>gpg --verify ~/file.asc ~/file</code></pre>I receive the following:<pre><code>gpg: Signature made Tue 10 Dec 2016 05:10:10 AM EST using RSA key ID abcdefghgpg: Good signature from \"Alias (signing key) <john@alias.org>\"gpg: WARNING: This key is not certified with a tru... | GPG why is my trusted key not certified with a trusted signature? | security | 2017-01-06T04:39:24.547 |
[
{
"message": "I am still in college. Recently, I completed my OSCP and have been asked by my professor to do a robust pentest on our University's Network Infrastructure.Although I agreed, I have no idea regarding what paperwork should I present the university authorities.(If any)A contract might look like an ov... | Pentest for my college | security | 2017-01-06T16:19:13.943 |
[
{
"message": "I'm doing a presentation about security/privacy on web and i would appreciate few hints about what would you talk about. Just general, nothing IT specific. I just wanna give a 1000 foot view on few topics and go deeper if I see interest. People should know about a threats on the web and also not j... | What should be people warned about? | security | 2017-01-06T16:41:37.450 |
[
{
"message": "I would like to create a SSO where my users can login to machines and wordpress (php) websites.So far I have LDAP with Kerberos working. I can login with the same credentials to every service, however I can't seem to avoid having to re-login when I move from one service or host to the next.It's ha... | SSO Understainding Credentials and Authentication | security | 2017-01-07T00:38:49.380 |
[
{
"message": "BackgroundI am implementing set of Micro services using Java spring MVC and hosted in Undertow containers using Gradle. I am using a Java keystore to secure my keys which are using by the service to perform encryption and signing. When a user spawning a Micro service, user injects the password int... | Securely store password for Java Keystore | security | 2017-01-07T09:49:18.717 |
[
{
"message": "I am looking for CPU, GPU and/or ASIC performance stats on hash performance. Specifically SHA256 and Argon2i. I've googled and only came up with very limited anecdotal evidence. Considering that this fast-changing field is so important for security managers, I would expect there to be a resource t... | Source for up-to-date GPU/ASIC hash performance? | security | 2017-01-08T16:06:38.637 |
[
{
"message": "When I connect to an HTTPS website on an online web browser such as <a href=\"https://www.browserling.com/\" rel=\"nofollow noreferrer\">https://www.browserling.com/, is my connection still secure, or will the online web browser I use be able to see my traffic? I am aware that HTTPS guarantees tha... | Is HTTPS secure when using an online web browser? | security | 2017-01-09T01:07:11.550 |
[
{
"message": "I am busy with security testing on a clients network and was asked to show how \"easy\" AV evasion is. I created a nice powershell reverse HTTPS file through veil-evasion, which is not detected by the Symantec virusscanner (testing with Norton Deluxe).So that was easy enough, but when I run it the... | Meterpreter HTTPS detected by IPS | security | 2017-01-09T08:09:00.683 |
[
{
"message": "Is this Public Key Infraestructure possible according with the <a href=\"https://tools.ietf.org/html/rfc6960#page-16\" rel=\"nofollow noreferrer\">RFC 6960 Online Certificate Status Protocol - OCSP, Authorized Responders?<a href=\"https://i.stack.imgur.com/1PSdK.png\" rel=\"nofollow noreferrer\">O... | Can an OCSP response be issued by a subca of the Root CA that has issued the certificate? | security | 2017-01-09T10:02:50.103 |
[
{
"message": "<pre><code>int play() { int a; int b; char buffer[010]; a = 0x41414141; b = 0x42424242; if (write(STDOUT_FILENO, \"For a moment, nothing happened. Then, after a second or so, nothing continued to happen.\\n> \", 91) < 0) { perror(\"write\"); } if (read(STDIN_FI... | Buffer Overflow: Advice on exploiting | security | 2017-01-10T00:11:45.327 |
[
{
"message": "Well the title kinda ask all, I've been using DriveDroid on Android to emulate a read-only USB drive that I can plug in any machines to copy the files to the PC. I do use the same USB cable.For attacks like BadUSB is that safer? I would think not, but are they common enough in the wild to worry ab... | Is Android ( Linux ) emulating a read-only USB storage device safer than a USB drive? | security | 2017-01-10T02:13:48.613 |
[
{
"message": "As far as i understand, <pre><code>Master_key = PRF(\"pre_master_key\", client.random, server.random)</code></pre>Session keys and other keys derived from Master_key, Client.Random and Server.Random.After session resumption, Master_key will be same as i know. Will session keys and other key again ... | Derivation of session keys from master_secrets during session resumption | security | 2017-01-10T11:41:53.987 |
[
{
"message": "I have a hierarchy of certificates which contains:<code>root-cert</code><code>server1-CA</code> (issued from <code>root-CA</code>)<code>client1-cert</code> (issued from <code>server1-CA</code>)<code>server2-CA</code> (issued from <code>root-CA</code>) <code>client2-cert</code> (issued from <code>... | Can we use one CA to revoke certificates generated by another CA? | security | 2017-01-11T14:57:17.637 |
[
{
"message": "My friend got infected by \"Marlboro\" Ransomware (description of the nasty thing: <a href=\"http://sensorstechforum.com/marlboro-ransomware-remove-restore-oops-files/\" rel=\"nofollow noreferrer\">http://sensorstechforum.com/marlboro-ransomware-remove-restore-oops-files/).I have researched online... | Affected by Marlboro Ransomware (".oops" extension) - Which decryptor to use to decrypt the files? | security | 2017-01-12T17:43:51.873 |
[
{
"message": "I have a port forwarding rule sending 23 traffic to a \"honeypot\" (called \"comp\" below). Throughout the night, many bots from around the world attempted to connect, but there was no service running.Now, I wrote a C program that just binds to 23, accepts a connection, and exits. When a bot scans... | Why aren't telnet bots finishing the three-way handshake? | security | 2017-01-12T21:17:09.683 |
[
{
"message": "Do 3rd party cookies open up the possibility of CSRF where it may not exist? I was looking at a <a href=\"https://www.sjoerdlangkemper.nl/2016/04/14/preventing-csrf-with-samesite-cookie-attribute/\" rel=\"nofollow noreferrer\">blog post as well as an <a href=\"https://tools.ietf.org/html/draft-wes... | Third-Party cookies and CSRF | security | 2017-01-13T16:07:43.040 |
[
{
"message": "I would like to test a model for preventing information leakage in an environment that consist of the following:a group of senders of emails or messagesa group of receivers of the emails of messagesa set of connections established between the users of the two groups aforementionedI found that the ... | public database available for testing email security proposal? | security | 2017-01-14T14:59:24.550 |
[
{
"message": "Some antivirus software MitMs, or through other methods, HTTPS connections in order to scan for malware, for example, Avast, and maybe other vendors too.Is the method they (let's say Avast as an example) use secure? Is their claim that the data never leaves my computer true?Should HTTPS connection... | Should antivirus HTTPS scanning be left on? Is it secure? | security | 2017-01-15T00:23:09.820 |
[
{
"message": "Do all email servers (also different providers) that implement tls, use tls to encrypt the messages and headers?Could the missing of tls-encryption be a sign of ssl-downgrading and how to find out if a server does implement tls?",
"role": "user"
},
{
"message": "<blockquote> Do all em... | How is the exchange of tls on email servers? | security | 2017-01-15T15:12:02.390 |
[
{
"message": "A few days ago, an old \"vulnerability\" of WhatsApp re-appeared in the media.The Guardian published <a href=\"https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages\" rel=\"noreferrer\">this article calling the vulnerability a \"backdoor\". The ... | Attack vector for exploiting WhatsApp's retransmission "vulnerability"? | security | 2017-01-15T22:28:47.860 |
[
{
"message": "The head of Information and Communication Technologies Authority of Turkey said this on <a href=\"https://twitter.com/ofatihsayan/status/820372561485766656\" rel=\"nofollow noreferrer\">Twitter yesterday:<blockquote> WhatsApp can read your end to end encrypted messages when necessary. It can decr... | Does WhatsApp have a golden key to decrypt messages? | security | 2017-01-16T05:37:48.490 |
[
{
"message": "I am not a security expert, and unfortunately we are too small company to have one. Since I am in charge of completing PCI DSS self-assessment questionnaires, I was shocked with the amount of questions specified.First couple of questions are about firewall, network topology, routers etc, etc. Sinc... | Are SAQ A-EP network questions office network or a web server network? | security | 2017-01-16T14:42:49.443 |
[
{
"message": "When I run a nmap scan against a remote target, it shows port 25 closed but an online nmap tool like (<a href=\"https://hackertarget.com/nmap-online-port-scanner/\" rel=\"nofollow noreferrer\">https://hackertarget.com/nmap-online-port-scanner/) shows that port 25 is open.<pre><code> sudo nmap -sS ... | System nmap shows port closed but online nmap tool shows port open | security | 2017-01-16T15:58:32.487 |
[
{
"message": "I have client and server code for different SSL implementations like, openssl, wolf ssl, matrix ssl and I want to benchmark these implementation based on: Influence of symmetric key generation frequency. Influence of CPU performance. Influence of the asymmetric key size. Influence of the object si... | SSL benchmarking For Openssl | security | 2017-01-17T10:38:44.970 |
[
{
"message": "I'd like to secure my application's traffic using TLS with pre-distributed self-signed certificates (as a drop-in replacement of plain TCP).In some cases, two clients won't be able to talk to each other directly because of presence of NAT and will have to resort to an accessible relay to tunnel th... | Is it sensible to tunnel TLS traffic over another TLS? | security | 2017-01-18T13:05:52.853 |
[
{
"message": "I'm running a packet capture on my test client (running in managed mode) and also on my attacking machine (running in monitor mode). It is my understanding that 802.11 networks using WEP encryption do not encrypt ARP packets. This would make sense, as I need to capture an ARP packet in order to pe... | Wireless - why can't i view ARP broadcasts in monitor mode on encrypted networks? | security | 2017-01-18T14:36:33.163 |
[
{
"message": "In a web-application the session time-out is not defined neither in the application nor in the application configuration. But the default time out is taken from the IIS. what is the security issue if the session time-out is default IIS server session value? Does issue vary from IIS to web sphere?"... | what is the security issue if session time out is the default value from server configuration? | security | 2017-01-19T17:18:18.740 |
[
{
"message": "Scenario is: attacker is disconnecting devices using <code>aireplay --deauth</code> command on AP so none of my devices are connecting to AP. Then what do I do now when none of my device is connected to AP?",
"role": "user"
},
{
"message": "Fighting interference is difficult. These fre... | How to connect to AP when attacker is deauth'ing my device? | security | 2017-01-19T18:03:05.317 |
[
{
"message": "Update: Now Chrome rejects this website for me.It seems the trusting is just cached somewhere?<br>I guess this question isn't as interesting as I thought, but it'd be nice if someone could clarify it.Original question:I've disabled automatic certificate updating, removed the root certificate, and ... | Why does Chrome tell me this certificate is valid when it can't be verified? | security | 2017-01-19T20:01:06.380 |
[
{
"message": "I have a server that implements DTLS using OpenSSL 1.0.1 but supports only RSA keys as of today. I want to add support to this server to accept EC keys to be able to implement the newer ECDHE-ECDSA cipher suites while retaining support for RSA. Any pointers as to how to go about this? All my searc... | Server with support for both EC and RSA keys | security | 2017-01-20T23:49:54.233 |
[
{
"message": "If i'm correct, due ASLR we load libc into some random address. And then in order to make that happen without allowing write permissions of text pages within memory we use plt/got. Now I can simply jump back into some libc@plt function that is well-known before execution of the program and pretty ... | Is ASLR useless in preventing attacks such as return-to-libc in linux? | security | 2017-01-21T13:58:53.860 |
[
{
"message": "I was wondering in the Chaskey, when the message <code>m</code> is split into fixed size blocks such as <code>m1,m2,m3....ml</code>, what would be the size of each message block?Is it 128 bits each or it can be of any variable size?m=m1||m2||m3||...||ml",
"role": "user"
},
{
"message":... | Chaskey - LightWeight MAC algorithm | security | 2017-01-21T23:07:54.257 |
[
{
"message": "I'm working on a new project that encrypts folders on my personal computer.No sending of files are involved(networking). It is only for protection and security. Is it possible to combine RSA and AES for encrypting/decrypting folders with the use of password? (This is only for research purposes)",... | Is it possible to combine RSA and AES? | security | 2017-01-21T23:58:05.860 |
[
{
"message": "I noticed K-9 Mail (Android), Geary, Sylpheed and Thunderbird are leaking my personal and private IP in the email headers.I know web clients like gmail don't suffer from this problem. But what can I do to avoid my IP leaking while using desktop/mobile apps. Are there any options/configurations ava... | Email Client STMP Personal IP Leak | security | 2017-01-23T04:24:06.720 |
[
{
"message": "Can someone elaborate on the attacks alluded to in this paragraph from the W3C <a href=\"https://www.w3.org/TR/SRI/#is-response-eligible-for-integrity-validation\" rel=\"nofollow noreferrer\">SubResource Integrity spec?<blockquote> In order to mitigate an attacker’s ability to read data cross-ori... | What attacks are mitigated by requiring CORS for subresource integrity verification? | security | 2017-01-23T04:31:18.750 |
[
{
"message": "I think in a PHP file upload it is a best practice to store files outside of the document root with a randomly generated file name and telling the server to make them non-executable, so the file will not be executed by an attempt to access the file via HTTP.If storing them outside the root and pre... | Changing file extensions in PHP file upload to prevent code execution? | security | 2017-01-23T15:13:53.780 |
[
{
"message": "Okay, so I am basically an electronics student so I have limited knowledge on the subject. So please help me out here. The thing is that one day, as I was browsing, I opened up Google and instead of the Google logo, a \"You have been hacked\" image came up. I share a flat with 5 people and one of... | How to stop the "mitmf" tool on my home network? | security | 2017-01-24T15:21:05.470 |
[
{
"message": "I have a web application, say <code>http://web.app/</code>. It is local for every given user and accessible without authorisation. It uses an API of a service <code>https://service.app/</code>. The user can log in to it and see his API key. The user just copy-pastes it from the service to the app ... | Do I need OAuth to pass an API key of a service (now it is passed via copy-paste)? | security | 2017-01-24T15:57:27.243 |
[
{
"message": "The current setup is the following:A production server (host) has only a few open ports, namely HTTP, HTTPS and secure ports for e-mailing.On the host there is a non-privileged user running a Docker engine and containers.Several web applications are running on Docker containers, each runs on a vir... | Is it a good practice to proxy web-applications from Docker containers? | security | 2017-01-24T17:13:08.813 |
[
{
"message": "By my understanding of how VPN's work the answer is no because the VPN doesn't reveal the source IP is from AWS. But, I asked this question on Quora and everyone is saying they can still see the AWS source IP address. <a href=\"https://www.quora.com/If-an-AWS-machine-accesses-something-with-a-VPN-... | If I use an AWS machine to connect to "Website ABC" through VPN, will "Website ABC" know I'm connecting from an AWS machine? | security | 2017-01-24T23:53:12.157 |
[
{
"message": "Im trying to set up a fake AP using aircrack-ng suite, DHCP server & iptables.After creating the fake AP: <pre><code>airmon-ng start wlan1airbase-ng -c 11 -e \"freewifi\" wlan1mon</code></pre><a href=\"https://i.stack.imgur.com/Kp5Dd.jpg\" rel=\"nofollow noreferrer\">running iptables configura... | Setting up a fake AP - problem with iptables and DNS server | security | 2017-01-26T13:01:58.173 |
[
{
"message": "If one knows that a certain WPA2 CCMP encrypted network uses a password that is 16 characters and only numbers and uppercase letters (ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890) and has a handshake from that network does that make it possible to crack the password in a plausible amount of time? I know i... | Possibility Of Cracking WPA Password with Additional Information | security | 2017-01-26T14:56:38.337 |
[
{
"message": "Two properly placed $200 HD cameras are able to make close pictures of both sides of a credit card used while shopping. When you insert the card to the card reader, both sides get exposed, including the credit card number, name, expiry, CVC. That's far enough to get your money stolen.I think this ... | Protect credit card from spying eyes | security | 2017-01-26T14:58:43.473 |
[
{
"message": "Countries such as China are known for blocking VPN connections, which causes a lot frustration for residents and temporary visitors alike. However China doesn't (yet) apply a white-list mode to outgoing traffic, so it's possible to connect to any regular website that is not on the ban list.So why ... | Why don't secure tunnels (such as VPN) mask themselves as an HTTPS stream? Wouldn't this make it impossible to block them? | security | 2017-01-29T13:29:55.367 |
[
{
"message": "I wasn't sure whether to ask this on crypto or security, but since it involves real-world trust and services, I figured this is the better place.Consider that me and my friends (whom for the purposes of this question I do not trust) want to lock in a random number that only becomes available at a ... | Good publicly available unpredictable random number sources? | security | 2017-01-29T14:32:42.297 |
[
{
"message": "I'm interested in finding out what is the best method to enter sensitive information somewhere given an insecure computer.Granted, I know that if the computer has a keylogger or some other malware that captures input, there are much more important things that I should worry about (for example what... | How to enter sensitive information securely? | security | 2017-01-30T04:35:57.573 |
[
{
"message": "I have tried to understand CVE-1999-0524.It is recommended to configure the firewall to prevent ICMP timestamp responses: <a href=\"https://access.redhat.com/security/cve/cve-1999-0524\" rel=\"nofollow noreferrer\">https://access.redhat.com/security/cve/cve-1999-0524What if I will not do it?What i... | What is implication of ICMP timestamp responses? | security | 2017-01-30T14:52:34.943 |
[
{
"message": "I have a scenario. I want to scan a web app which is placed in another DC behind a different firewall(not web application firewall). We can have open ports to reach the application. The tools generally used by testers is Acunetix, Appscan, burp and webinspect. The Web server is not behind a PAT or... | Web App Scans scans through the network firewall? | security | 2017-01-31T05:48:12.823 |
[
{
"message": "I am using an Samsung S7 edge; together with IBM Maas360; and I ran into a an interesting situation.Prior last week, my S7 was running Android 6. Android can be configured to ask for your password before the system starts. By default, the device will start the OS, and later on, when the OS is up a... | How does Android 6 full encryption work ... when it doesn't ask for the password at start time? | security | 2017-01-31T12:16:45.560 |
[
{
"message": "I have heard that the EAP protocol has authentication capabilities for wireless networks too. But I am not able to get how it is deployed in real time as I know that whenever I need to connect to my router, I just type in the password and it's done but where EAP in that?",
"role": "user"
},
... | In Real-Time, where do we deploy Extensible Authentication Protocol(EAP) in Wireless Networks? | security | 2017-01-31T15:32:05.990 |
[
{
"message": "I am designing a workflow for issuing and acquiring of voucher cards for a client and the chosen technology for the cards has been mifare desfire.I have a lot of experience with credit cards and we want to make the technology as POS friendly as possible, so the acquiring process could be made as s... | Securing authenticity of mifare cards, protection against cloning | security | 2017-02-01T13:34:11.573 |
[
{
"message": "I am attempting to conduct a deauthentication attack on a stand alone AP using Aircrack-ng. Im using an ASUS 802.11ac router and using aireplay-ng to send the deauthentication packets. But when conducting the attack whilst the router has any form of security enabled, WPA/WPA2, the deauthentication... | Stations not deauthenticating when using Aircrack-ng | security | 2017-02-01T16:09:01.493 |
[
{
"message": "An e-commerce website uses LAMP stack hosted on a single rack-mounted server located at a data center. On every transaction, credit card information is stored in the MySQL database at data center. For accounting purposes transaction records (including credit card information) is transmitted in sta... | single secure architecture solution for below 4 threats | security | 2017-02-01T18:17:10.403 |
[
{
"message": "What is the message flow, or sequence that enables JWT encryption of the payload? (opposed to OAuth / OpenIDConnect which doesn't encrypt the payload)",
"role": "user"
},
{
"message": "Short answer: <a href=\"https://tools.ietf.org/html/rfc7516\" rel=\"nofollow noreferrer\">RFC 7516Lon... | How does JWT Encryption work? | security | 2017-02-02T05:00:01.330 |
[
{
"message": "ASP.NET includes a request validation system that halts page processing if any of the following characters are present in the path portion of the URL <code>< > * % & : \\ ?</code>. Instead of the normal page, the runtime returns an error page which says<blockquote> A potentially danger... | What specifically is "potentially dangerous" about an ampersand in a URL | security | 2017-02-02T11:47:54.863 |
[
{
"message": "Context: A website is hosted on multiple dedicated servers. There are frontend webservers, backend DB servers and other servers between them.The DB holds user's accounts passwords. All connections are secure and the registration/login pages can not be bruteforced (out of the question's range).Thre... | Hashed passwords storage: iterations vs entropy | security | 2017-02-02T15:47:21.443 |
[
{
"message": "What is the right way to escape bad data the var \"<code>$actuallinkk</code>\" inside this java script <pre><code><a href=\"javascript:reportUser(\\''.$actuallinkk.'&act=inviteadmin\\')\">Invite Consultant to this conversation</a></code></pre>this is what i did below, i don't know ... | What is the proper way to escape bad data from link in javascript against xss | security | 2017-02-02T16:17:51.197 |
[
{
"message": "I was recently going through the group policy editor in Windows. There is in an option of storing passwords with reversible encryption.But in InfoSec, we always say that we should store passwords in such a way that it cannot be reverse engineered.But why is that option there? any specific need or ... | Why is the Store Passwords with reversible encryption option even there? | security | 2017-02-02T16:46:59.707 |
[
{
"message": "When you enable BitLocker, there is a period of time where BitLocker is slowly encrypting the contents of the drive in the background. During this time, is it guaranteed that new data written to the disk will be encrypted as it is written? Or is it possible that it will be written to the unencrypt... | Will new data written to disk while BitLocker is encrypting the disk be encrypted? | security | 2017-02-02T22:38:41.463 |
[
{
"message": "I have a site. My site does not have any cookies. It is developed with Drupal 8(CMS) and have few articles. Just for a curiosity I did check whether my website uses cookies or not. I did use Firefox to check.The Firefox message box showed that, your site is using cookies as shown below. What this ... | What is the purpose of this cookie? | security | 2017-02-04T06:47:52.253 |
[
{
"message": "I am building a WebRTC application, and really concerned about security.I have read this quite interesting article : <a href=\"https://webrtc-security.github.io\" rel=\"nofollow noreferrer\">https://webrtc-security.github.ioAs I am far from being an expert in networking security, I just want to co... | WebRTC security & encryption | security | 2017-02-04T14:32:56.157 |
[
{
"message": "Our university teachers have given us a challenge and they will increase every student grades by 2 points if even one of us succeed.The challenge : They have built a website using modern technologies (HTML5/JavaScript) and \"all\" we have to do is getting access to the database that is behind it a... | Hacking Challenge | security | 2017-02-04T22:23:37.263 |
[
{
"message": "I am preparing a project for a client. It is a wireless device to be used inside a factory so the workers can interact with the factory without having to go to a terminal. In order to connect the device to the system easily I see two main possibilities: Bluetooth or Wi-Fi.The client prefers to use... | Security of Wi-Fi vs Bluetooth | security | 2017-02-05T12:48:29.580 |
[
{
"message": "My school's wifi network is open, but requires a login with student account name/password in the browser.What confuses me is that it asks for this login every time the network is accessed (or every few hours while continuously connected). Is there a reason it has to do that? Why can't the network ... | Why should I need to sign in to a (school) wifi network every time? | security | 2017-02-05T18:59:48.863 |
[
{
"message": "Is it valid to use X-Frame-Options:DENYX-Frame-Options:SAMEORIGINin the response header together? Or should only either one be present?",
"role": "user"
},
{
"message": "It's not valid and it wouldn't make logical sense, because DENY blocks everything that SAMEORIGIN does and more.Addi... | X-Frame-Options question | security | 2017-02-06T04:17:16.507 |
[
{
"message": "Assuming I'm working on an environment that currently uses MD5 to hash passwords, and I want to switch to something more secure. I already heard of bcrypt, but I had another idea.Would it be possible to use RSA2048 to hash passwords if I just threw away the private key of the key pair?If so, is th... | Can you use RSA2048 to hash passwords? | security | 2017-02-08T08:34:43.180 |
[
{
"message": "I have been going through the <a href=\"https://www.ncsc.gov.uk/documents/cyber-essentials-common-questionnaire\" rel=\"nofollow noreferrer\">cyber essentials questionnaire and this one question is confusing me and I wondered if you could provide any insight into it for me.in one of the 5 sections... | boundary firewall cyber essentials question | security | 2017-02-08T12:56:56.527 |
[
{
"message": "I am trying to generate a private-public key pair and convert the public key into a certificate which can be added into my truststore.To generate private & public key: <code>openssl rsa -in private.pem -outform PEM -pubout -out public_key.pem</code>Now I am trying to convert this to a certific... | Expecting: TRUSTED CERTIFICATE while converting pem to crt | security | 2017-02-08T17:30:28.480 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.