instruction stringlengths 24 29.9k |
|---|
Previously, I asked the question Why is it difficult to catch “Anonymous” or “Lulzsec” (groups)? I understood every answer except the VPN thing. Its because I never knew what VPNs were. Any how that answer said:
With the VPN, all your traffic is relayed through it so wherever you
connect it can only track back the I... |
How can I secure my computer more, knowing these days that there are many websites, especially ones where you don't have to even click before a virus is downloaded straight to your hard-drive.
I read an article on Flash player having a security loophole that can automatically start up a webcam without the owner even k... |
Lots of different programs, such as Darik's Boot and Nuke, let you write over a hard drive multiple times under the guise of it being more secure than just doing it once. Why?
|
This isn't really a practical question, but more a question of curiosity. I heard a CS professor recommend stepping up from md5ing passwords not to SHA1, but to AES encrypting the password using itself as the key. Does anybody have any insight as to whether this is actually more or less secure?
Some thoughts on the mat... |
http://thehackernews.com/2012/01/next-microsoft-patch-tuesday-include.html
I thought the vulnerability that BEAST uses is already fixed on "Microsoft" side, no? Can someone please clarify this?:
https://security.stackexchange.com/a/9952/2212
The TLS support for browsers right now is:
IE9 TLS 1.0, 1.1, 1.2 all support... |
I've been thinking about how an IPS works, and as far as I know it inspects the packets on the TCP\IP layer.
How can it detect attacks on higher levels without harming the user experience? How does it address the fact that there is a loss of information and re-transmissions?
In the end, there could be a long request ... |
If you visit most of the "online youtube download" pages, you will get this message:
Why all these sites come up with this message? Is it a worm, or just an unharmfull app?
|
I'm using Ubuntu without ever (knowingly) having had any virus issues.
Recently I put a usb pen in a computer in a print shop, and their Windows machine told me that it was infected. I would like to clean up this usb pen to start using it again.
I hope, that this virus is only for Windows and I am safe. But can I eve... |
I am making a C++ testing server and want to do that compiled programs would:
not have access to read or write files.
not have access to open or connect through sockets.
not be able to work with ANY non-standard C++ (e.g. system) libraries
have full access to CPU (no or very little performance loses).
have limited RAM... |
I'm not entirely sure if this is the right site for this, but I'll give it a shot.
Basically, I'm looking into different ways of setting up a single sign-on service for an existing corporate environment. Within this environment, there's anything from old legacy systems to new web services, all running on different plat... |
What are the career prospects for young professionals, when comparing IT Security field (penetration testing, vulnerability research) to business development on .NET and Java?
Which path should one take when we speak about salary and future prospects? Or, is there no obvious answer, everyone should pick what he likes m... |
Wikipedia defines Bitlocker as:
BitLocker Drive Encryption is a full disk encryption feature included
with the Ultimate and Enterprise editions of Microsoft's Windows Vista
and Windows 7 desktop operating systems, as well as the Windows Server
2008 and Windows Server 2008 R2 server platforms. It is designed to
... |
From @GrahamLee's comment over on this question, this is a very good point:
How do I choose whether to trust a particular website when the only information I have relevant to my trust decision is the web?
Do I trust it because of history? It has always appeared right so probably is now?
Do I count the number of other ... |
I'm thinking about the differences between physical authentication tokens such as RSA's synchronous physical tokens or asynchronous challenge/response, like Google's gmail direct-to-phone codes.
At the highest level of abstraction, are there reasons why a synchronous token will be better than an asynchronous token and/... |
Is there a difference between a VTI (Virtual Tunnel Interface) and a regular VPN tunneling process?
Or have I got the whole concept wrong?
|
In a web application that (as a side effect of implementing the password anti-pattern) stores passwords, one recommendation is to bcrypt to store them (or computationally expensive one-way salted hashes of them). However, doing this makes the server process spend most of its time doing CPU intensive bcrypt comparisons... |
My bank emails my monthly statement to me in a password protected PDF attachment. Is this a secure method of transmitting something as sensitive as bank statement?
|
A 'TPM chip' is:
a secure cryptoprocessor that can store cryptographic keys that
protect information
FIPS 140-2 requires a cryptographic module, which can be hardware, software, or both that have been certified.
If I was using Bitlocker as a cryptographic module, would I need a TPM as another piece of that crypto... |
Possible Duplicate:
Can you get virus just by visiting a website in chrome
I have a hard time believing that drive-by downloads can actually happen without a user's assistance (e.g. without the user clicking a popup and downloading a program).
To test this, I've set up a virtual machine with IE 6 on it (no updates!)... |
So, since Android 3, devices can perform boot-time, on-the-fly encryption/decryption of the application storage area (NOT the SDcard/removable storage) - essentially full-disk encryption. This requires a password/passphrase/PIN to be set as the screen unlock code and decryption key, unlock patterns cannot be used.
I ha... |
I'm running some non-critical Ubuntu servers in my dorm room in college. Turned them off before break, come back, SSH in, and get a warning that the ECDSA keys have changed.
It looked pretty much like this
Warning: the ECDSA host key for '<snip>' differs from the key for the IP address '<snip>'
Offending key for IP in... |
Is it possible to capture the cookies used by HTTPS site when cookies don't have secure flag set.
Suppose the site is https://www.example.com.
http://www.example.com does not show up, also http://www.example.com:443 does not.
Still can there be any way?
|
I'm working on a web site with a several levels of subdomains. I need to secure all of them with SSL, and I'm trying to determine the correct certificate strategy.
Here's what I need to secure:
foo.com
www.foo.com
Any combination of city.state.foo.com. (These are US states.)
My understanding is that a wildcard certif... |
We have a site with two wildcard certificates: *.foo.com and *.bar.foo.com. All of our subdomains resolve to the same IP address.
Newer browsers work fine with this, but IE7, for example, does not. My understanding of the problem is this: in older version of SSL (prior to TLS 1), the domain name itself is encrypted. Th... |
In the Gawker data breach, was just the database stolen and that gave free access to all user data? Or did the hackers still need to read the MD5's of the usernames and passwords to gain access to the data?
If you had a strong, non-dictionary, 12+ character password, is there any need to worry?
|
Does it really make sense to use anti-CSRF tokens in a web application that is accessed by HTTPS only? If yes, then what are the possible ways to attack such a web application if anti-CSRF tokens are absent?
|
I understand anti-CSRF tokens to be a chunk of data sent in the response that is expected to match in subsequent requests, but is not stored in cookies. For example, a form with a hidden value that must be included before action is taken on the submit.
The drawback to this is that all the apps and programmers must reme... |
We are a development team working on a new 0-day protection security product.
We aim to protect against new unknown 0-days attacks against servers.
We have a very strong solution ready to demo.
The question is: how do you demo such a product ???
If you show that you can protect against known attacks - then you are no b... |
I was reading that Symantec suffered a source code leak and I was wondering how bad this is for a anti-virus product. Do these products rely heavily upon "(in)Security Through Obscurity" or does it really matter? ClamAV is open source, does this weaken the security that it can provide?
|
MAILER-DAEMON notices are spamming our email administrator account, causing it to fill up, and bringing down our email server.
Our email server is a Virtual FreeBSD box hosted by Verio. Their support has been useless. I am not very familiar with FreeBSD, and because it is a virtual private server, I don't have wheel ... |
I'm behind a corporate firewall which restricts access to certain urls and most downloads. The download restriction is mainly on .exe(but it allows some exe files to be downloaded and I don't know why!)
The main picture here is that i can download an 'access restricted' file or exe through other means, like dropbox.
H... |
The scenario is as follows:
There are clients that users can access and work with.
These clients can be online or offline.
There is a central database on a server, holding all the authorization data.
The clients each hold a mirror of a part of the central database.
At regular intervals, the client go online to connect... |
Do I have to mind something specific when using public keys and SSH? Well of course, I have to keep my private key secret (and therefore I should choose a strong pass phrase). But is there something else? When running ssh-keygen is it a good idea to use the default options? The 2048bits are a good choice? I read somewh... |
I just did a fresh install of Snow Leopard on a newly-formatted hard drive.
Logged into the iPhone Developer Page with Google Chrome (latest build) here:
http://developer.apple.com/iphone/index.action
I login as usual, but instead of seeing my developer account info, I see someone else's.
Even if I click logout, it won... |
Possible Duplicate:
Apache Server Hardening
I'm going to make a web server on Apache 2.
What are the security issue I will be looking at? And how do I secure it?
I have been reading news about DDOS attacks, web server hacks.
(I'm very new to Linux, I have started learning Linux 8 months ago.)
|
A friend of mine made a personal data CD. Days later he found a copy elsewhere.
He wants to prove the copy didn't come from his computer, but that someone took the CD and copied it from another computer. Can it be done?
|
I am working on a large web application that runs entirely within a single web-page. For various reasons we do not want to use cookies in this web application, at all, but we need to keep track of whether a user is currently logged in or not. All of our connections are over SSL. Here is how we plan to keep track of ses... |
I need a VM Hypervisor that will not leak to the guest that its in a VM. The guest should believe its on a full physical machine.
Apparently VirtualBox fails at this, along with Virtual PC and VMWare. Before I dive into monsters like Xen, is there any hyperviosr that can do this?
|
We run online contests and want to eradicate cheating (yeah right), or at least mitigate it. I've asked the question regarding user experience here: https://ux.stackexchange.com/questions/15980/ways-to-avoid-online-contest-voting-fraud-is-sms-account-verification-too-much/15991#15991.
Now I want to know about the viabi... |
I'm a security enthusiast, and am in need of some guidance to get me into the branch. I've always been held back by lack of methodology in my research, and it tends to break down my motivation towards learning and studying new concepts within the field...
My problem is this:
The past few days I've been debating whether... |
Mitigating Cheating & Voter Fraud in Online Contests…
We run online contests of various sorts that involve users voting on entries (usually one vote per user per day). The prizes range from hundreds to thousands of dollars. Over the last four years we have encountered a number of ways people try to cheat, and have impl... |
Why are hard drives mounted by default in Windows OS, while they aren't in Linux OS? Is that a security issue?
If your computer was hacked, can unmounted drives be considered clean?
|
I am starting my final year project and I have decided to make an Intrusion Detection System, but I am a little confused where to start. I have read some papers and those have been pointing out the different features (like distributive nature of IDS etc.) instead of pointing out a real start. I just want to know fr... |
I need to know the crypto algorithm and key strength of NSDataWritingFileProtection. I would like to know the same things for using the Keychain and NSFileManager.
I searched the Apple Developer references:
Security Services
NSDataWritingOptions
But found nothing specific.
The Advanced Encryption Standard Algorithm V... |
If my knowledge is correct with respect to simple SSL, Mutually Authenticated-SSL has the advantage that both end parts are authenticated one to another:
Not only the Client endpoint knows that he is communicating with the
Authenticated Server endpoint, but also the Server endpoint is sure
that he is communicatin... |
I came across the term "cryptographic oracle" and despite a bit of googling I was unable to come across a clear, concise definition. What is a cryptographic oracle and what does it do? Can anyone give an example?
|
I would like to begin testing and working with BackTrack. I have heard that the Alfa AWUS036H wireless adapter works well with BackTrack and allows for packet injection. This adapter, however, is only a wireless b/g adapter. I was curious if there was something similar to this adapter that would allow for packet inj... |
I have been doing some research about Web Services security. I noticed that some sites are using Ajax and JQuery to consume ASMX WebServices. I navigated to the Web Service EndPoint and I realized that, from my machine, I was able to use the Test form to consume the service,a part from that I was able to see the HTTP m... |
I need to list all the connected devices in my AP wireless network including mobile phones, also if it possible to know more information about each device, I am using Windows 7 and my access point is TP-Link
|
I've heard that if your PC is turned off, then an attacker can recover the RAM from the last session. I find this hard to believe. How could it be done?
|
Recent version of PHP 5.3.9 has been released a couple days ago, and Hash Collisions have been fixed, most of the servers actually didn't upgrade their server until now, including my website's server.
In this article I came across a part that has been told sites that are in a shared hosting can't upgrade their PHP by t... |
I'll be making a website with a membership type of option for the website, and I'll be most likely using Authorize.Net to make the transactions, however, I need to know what kind of encryption I can use to store credit card numbers in a MySQL database?
|
Twitter and various other web companies allow users to help translate the user interface into their language.
Crowdsourcing translations isn’t new for us. Since October, 2009, we’ve counted on Twitter users to volunteer as translators and help us localize Twitter.
An HTML template then probably substitutes delimited ... |
I am wondering if there is a percentage of uniqueness known to be lost with every repeat of various hash routines, like MD5, SHA1, and how that might compare with other algorithms.
If theoretically I could store 256^16* 99% different values and each have unique MD5 equivalents, Hashing 100 times would give me .99^100= ... |
With so many internet attacks out there, I just think it would be convenient (and quicker and wise) if there is a way to automatically harvest the hacked hosts that are used to launch internet attacks/probes. For example a SSH host could install DenyHosts and/or implement hosts.deny. From failed authentication data we ... |
I would like to know which degree out of these two would better prepare me for Information Systems Security. I want to eventually work with the CIA as a Information Systems security specialist however I've already put two years of work into my CIS degree and was wondering if i should transition over to the CS side. If ... |
What's a resonable session timeout limit and how can you determine it?
|
I'm a security researcher and I want to know what career path you think I need to follow to become a Chief Information Security Officer.
What skills are necessary in this position ?
What field of information security is more important in this position ?
With the goal of reaching this position, what kind of stuff/path... |
I noticed the Guardian Project has developed a converter to move your off-the-record messaging keys between different IM applications. I'm curious what happens if your using multiple off-the-record messaging clients without using their otrfileconverter program. You must clearly verify each contact on each client and ... |
Each computer is assigned one ip address on my network, and my ISP supplies one IP for my network. If I try to scan the ip supplied by my ISP what I got is the OS running on the router, running on the firmware.
How do I scan my internal network from outside?
For example
Computers on my network:
192.168.0.200
192.168.0... |
I know for a fact that it's possible for for an SSL\TLS session to go on without an SSL certificate, meaning you pass encrypted data, but you don't have a solid foundation of who you are really working with.
How is this carried out?
And is the SSL communication process when connecting to an endpoint with PuTTY differen... |
In my application, I want to hide debug feature behind a password. I don't want the password to be easily known by issuing strings executable, so I want to rely on digital signature.
We want Debbie to be able to debug the program.
The main scheme is:
Give the private RSA key to Debbie, put public RSA key in the progra... |
In a Check Point firewall, can you please explain what occurs between the POSTIN (I) and PREOUT (o) inspection points?
|
I've got a problem where someone has implemented a custom IMAP Server.
I need to write a custom application to get a list of emails, and fetch messages.
Problem is, every library I've tried to use fails with exceptions - BAD commands, etc.
But using thunderbird, it retrieves the list of messages and can fetch messages.... |
I have webserver (centos + cpanel), and one of the clients used my server for DDoS-ing, how can I identify that client/user?
What logs should I look to, is there any settings I can modify so such things can't happen again in future.
Thanks
|
Is XSS dangerous when the web application doesn't have a login/register function, the user isn't logged in or when the website doesn't store any sensitive user information?
|
I have a file - crl.txt - that contains the following:
MDYwNKAyoDCGLmh0dHA6Ly93d3cyLnB1YmxpYy10cnVzdC5jb20vY3JsL2N0L2N0cm9vdC5jcmw=
It's from one of the extensions in a particular X.509 cert. Why is it that when I run the following command nothing happens?:
openssl asn1parse -inform PEM -in crl.txt -i
Here's the hex... |
From the X.509 specs:
AlgorithmIdentifier ::= SEQUENCE {
algorithm OBJECT IDENTIFIER,
parameters ANY DEFINED BY algorithm OPTIONAL }
-- contains a value of the type
-- registered for use with the
... |
I have bought the Logitech Wireless Presenter R400, and it includes a Wireless receiver that it should be plugged in to the computer in order for the remote send signals to the computer.
I would like to know if that receiver is a weak point that can give an attacker the ability to breach into the computer? I would like... |
When you issue openssl dgst -sign key <file it follows the PKCS#1 standard to generate a digital signature.
hash file with some hash digest function
encode the hashed value in DER format, specifying the hash function used, and the hash function used.
sign the actual binary DER data with RSA PKCS#1, which pads it if ne... |
Is there a common system or pattern that combines the permissions given by a role in a RBAC-system with permissions in relation to data ownership?
For example:
Bob is a doctor and has the role with the privilege 'view patient details'
but only if 'patient is assigned to doctor Bob'
the above example places the re... |
I recently came across a JavaScript self decrypting archive. Is it secure enough to be used as a portable password storage tool? The author has even challenged it to be cracked.
|
Can s SSL server in response to 'CLIENT_HELLO' request choose a NULL value for the session ID in its response, SERVER_HELLO? Is it OK?
|
I can imagine a clientside JavaScript that gets executed in a vulnerable browser to do some harm, but how can this be done with PHP?
Since it's serverside it shouldn't have access to the visitor's computer.
|
By default ASP.NET checks for HTTP Response Splitting attack when you do Response.Redirect:
Response.Redirect("/MySite/Default.aspx?lang=foobar%0d%0aContentLength:%200%0d%0a%0d%0aHTTP/1.1%20200%20OK%0d%0aContentType:%20text/html%0d%0aContentLength:%2019%0d%0a%0d%0a<html>Shazam</html>");
Result - error page:
A potentia... |
Cross-posted to Quora
Today several financial institutes in Israel (banks, stock exchange) were DDOSed. They decided to block all foreign IPs as a first aid measure.
While I agree that it was possibly the best thing to do as a first aid measure, I was really surprised it was necessary. Don't banks and large institutes ... |
It is widespread knowledge, and therefore a common practice, to close open ports on any machines connected to the internet.
If for example, a typical program uses port xyz as it's communication channel, and there is a vulnerability in that program, which could be exploited through that port, why won't the same attack b... |
Is there known existence of rootkits for Mac OS X, and can you please provide examples?
What software would you recommend to detect rootkits on OS/X?
From a software developer's perspective, can you provide pointers on how to manually detect rootkits on OS/X? E.g., Is there any particular place in the kernel that I ca... |
What kind of cache-related attacks exists in modern Web world? The only one I'm aware of is Cache Poisoning. Is there anything else I should be worrying about?
|
A friend's start-up has implemented a number of business critical services on a Hudson/Jenkins server run on a Tomcat container. This is not an open-source project, in fact many aspects of this project are confidential. Jenkins is used primarily as a means of running batches & gthering results from those batches.
To s... |
I regularly find myself trying to login to websites where I don't remember the password I use. I make some guesses as to what I might have used but usually wind up having to reset it.
One thing that would make the process easier for me would be if the sites reminded me of what the password requirements were. (i.e. if I... |
I have recently setup "2-step verification" for my Google account.
One of the features is the ability to create "Application-specific passwords
" for devices that do not support the 2 step process. (Apps on smartphones such as Android, BlackBerry or iPhone, Mail clients such as Microsoft Outlook, Chat clients such as G... |
I would like to understand something about security. Say two parties have a private piece of data (e.g. a password or license key) and the receiver needs to know that the sender has the same key and they can only exchange information over a public connection.
I can think of two ways this can be accomplished which seem ... |
So I need to run a bit of software on my local network that I just have the .exe for. The caveat is:
The software needs access to the internet to produce a bunch of files.
I need to access those files from another computer on the network (they will be large so over the internet doesn't make much sense).
The exe will ... |
BitLocker can be used as a cryptographic module to fulfill FIPS 140-2 security level 1 compliance.
In a common setup, USB thumb drives can be used to unlock drives encrypted by BitLocker on startup.
What if the encrypted drive is on a virtual machine, is that still FIPS 140-2 compliant?
In a virtual machine setup, BitL... |
On my mac (Lion), I know that curl is bing used by some unknown process to communicate with a server.
Basically I installed little Snitch and find out that "somebody" is using curl periodically.
How can I find out who (what process) is firing up these curl calls?
I guess if a process is directly calling curl I should... |
I am starting to become wary of giving out my email account to anyone, just by doing reconnaissance it is evident how easy it is to pull so much information from a person just by a email,
There is a privacy concern (IMO), as email accounts are associated with social networks, blogs and any other online accounts.
How c... |
I have read:
PCI DSS 1.2
SOX 404
AR 25-2
ISO 27001
But only PCI DSS specifies a minimum password length.
Are there any other regulations that dictate password lengths for any industry?
NIST documents talk about the impacts of certain lengths and complexities [NIST SP 800-63b now provides guidance on password leng... |
I'm starting my MS in Computer Science (I hold a BS currently) soon and I'm considering specializing in cyber security. I'll be taking courses such as cryptography, biometrics, network security, computer architecture, and information and security among other things. I've been looking around at what jobs would be avai... |
What does everyone see as the top security concerns for mobile devices at the present time? I am working on a paper on the topic, but it seemed worth asking here to see if I might have missed anything.
|
Over the course of about a month we have received multiple reports of a rogue access point attempting to intercept traffic. I suspect an attacker is using a wifi pineapple, or similar hardware device. They seem to be enabling it for short periods of time and then disappearing before we have time to react. When this ... |
I have a following problem/challenge:
Web application (ASP.NET 3.5) installed on corporate LAN and operates on SQL Server DB needs to provide ability to generate custom reports.
These reports can be basically anything from underline DB, include complicated joints, unions and whatever you can think of. (Just selects, no... |
In the document Windows Server 2008 R2 BitLocker™ Drive Encryption Security Policy For FIPS 140-2 Validation, in the section 6.1.2 FIPS 140-2 Security Rules bullet point 2 it says:
BitLocker™ will only release keys to be stored on USB flash drives, if the Crypto Officer performs this operation
What does "operation" m... |
To ensure secure development in the off shore team what are considerations to be taken into account in the SLA?
I got this as a reference: http://www.it-director.com/enterprise/technology/content.php?cid=10427
Does anyone have any templates and sample documents to refer to?
|
I am currently working on an application that encrypts files with AES 256.
The problem is that I want the user to see whether the password is wrong before the file is decrypted.
For example if you want to decrypt a file that is about 1GB big it takes you 20 minutes to decrypt it, but only after the decryption do you ... |
I'm designing a web application where users will exchange short messages with the server very frequently (for instance, a few characters every second). I want the whole communication to be confidential, but the (perceived) performance must be acceptable. I had this idea of putting HTTP and HTTPS to work together using ... |
I recently asked a question about the differences between capabilities and mandatory access controls.
Among the answers I got the point was made that systems like SE Linux in targeted mode are not a typical MAC system, as the concern is not about restricting information flow.
Then, in a framework like SE Linux targeted... |
I've just signed up for a linux VPS to host a website I've been creating and I need some advice on the best approach to secure it.
I've previously been hosting it off a VM in the house, but I want to get rid of that. So security has been handled by the fact that I'm NAT'd and only certain ports opened/forwarded to the... |
After reading a bit about mint.com on the money stack exchange, I wanted to give it a try. But frankly, it scares me a little bit.
The site has a bunch of links explaining how they're so secure. I bet it's all true and I believe them that they take a lot of security measures. But one thing is misleading. They act like ... |
The native app is sending the UDID to the service provider in order to receive push notifications through APNS. How is it possible to prevent tampered requests (modified UDID) from getting processed by the service provider?
Scenario: an attacker may modify the UDID of the request sent to the service provider, thereby f... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.