Top new questions this week:
|
I need to receive some important documents from another person. It may be important to be able to prove (in justice) which files exactly I received from that person at a specific moment.
My first ...
|
In the last days I have seen two apparent "breaches" of Docusign's security. Neither are good evidence, but they illustrate the point:
Wall Street Millennial's youtube review of Joonko's ...
|
This is a follow-up of these two questions about using the TPM to store application's keys. While both have great answers, there is a specific aspect I am missing:
How safe are the keys inside the TPM ...
|
The network of a customer/company/VPN provider is compromised
while using VPN Clients, like for example Check Point Endpoint VPN or (Palo Alto Networks) Global Protect and so on. Would it be possible ...
|
According to the OIDC specification:
The issuer value returned MUST be identical to the Issuer URL that was
used as the prefix to /.well-known/openid-configuration to retrieve
the configuration ...
|
This Q pertains to PCI DSS v4.0 SAQ A - previous Q&A only touched on previous versions of PCI.
Since 4.0, merchants that accept credit card payment, even if they only iframe or link to their ...
|
From a detection standpoint, when pivoting inside a network what difference (if any) is there between establishing a remote connection between using Enter-PSSession -ComputerName PC1 vs winrs -r:PC1 ...
|
Greatest hits from previous weeks:
|
How easily could someone crack my keepass .kdbx file if that person steals the file but never obtains the Master Password?
Is this a serious threat, or would a brute force attack require massive ...
|
I notice that in /usr/share/wordlists in Kali Linux (former Backtrack) there are some lists. Are they used to bruteforce something? Is there specific list for specific kind of attacks?
|
This question has been asked several times, I'll link a few:
https://superuser.com/questions/791015/https-over-private-network
https://stackoverflow.com/questions/616055/https-certificate-for-...
|
I just got a call from a very weird number. On my phone it displays as "+1 (1) (5 )" and "USA" below.
I answered the call and there was 100% silence. Then about 2 seconds later the call ended.
Next ...
|
I can't get rid of ad.doubleclick.net malware from my PC.
I am using Firefox and it seems that all links that lead to www.googleadservices.com are redirected to https://ad.doubleclick.net/ddm/*** ...
|
I just noticed a strange email in my sent folder that I did not send. Here is the header information:
To: [email protected]
From: ********@gmail.com
Date: Mon, 10 Jun 2019 06:54:17 ...
|
What methods are available for testing SQL injection vulnerabilities?
|
Can you answer these questions?
|
I have recently successfully demonstrated a simple ARP spoofing attack on my home network. The setup in my home network, described to the best of my abilities is as follows:
Optical network router (...
|
I have a website with the following code:
<input class="Header--search--form-input" name="search" value="" onfocus="alert(1)" autofocus="...
|
I am in a corporate environment with on-premises AD on the company.com domain.
We have an AWS VPC hosting some .Net APIs in IIS - the domain these are in is companycloud.com. These APIs are all on the ...
|