TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 19)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

What's a "safe" URL shortening algorithm?

The situation: Currently, we are sending out emails and SMS to our users, which include a link to a form that each user has to fill out on a regular...

Asked on 12/31/2020 by BenSower

3 answer

Examples of SSH key exchange algorithms requiring encryption-capable host keys

In the SSH spec, Section 7.1, key exchange algorithms are distinguished based on whether they require an "encryption-capable" or a "signature-capable" host key algorithm. If I understood...

Asked on 12/30/2020 by Uncaught

0 answer

How can Google know that a Microsoft e-mail account is "not safe"?

Recently, I was forced to log in to my Gmail account with a browser to keep using it. Then, Gmail noted that the "alternate e-mail address", my 1999 Hotmail one,...

Asked on 12/29/2020 by Gsnail

1 answer

Securing internet connection with hostile ISP

Please excuse the lack of details, you can understand why. I have a friend in a foreign country who is certain that he is a surveillance target of his local...

Asked on 12/29/2020 by user242761

1 answer

How to block all inbound traffic from a specific Internet address or subnet using TomatoUSB router software (LINUX based)

I'm not trained in Linux, but I think I found the solution to my problem documented, but it is not working as expected. I am NOT an iptables guru,...

Asked on 12/28/2020 by appDeveloper

1 answer

Is Chrome Browser/ Computer compromised by KMSPico?

I recently installed a new windows key for my friend.He was using a hack program previously, known as Auto KMS. So after new keys installation, I used Windows defender...

Asked on 12/27/2020 by waterbyte

0 answer

Constant POST request spam to /cgi-bin/ViewLog.asp endpoint

I've got a DigitalOcean server that I use for different temporary servers. Lately I've found that sometimes I get a constant spam of the following requests:POST http://127.0.0.1/cgi-bin/ViewLog.aspHeaders: ...

Asked on 12/26/2020

2 answer

Is it safe to allow www-data to execute privileged commands?

I have noticed several questions on Stack Overflow, like this one, about executing commands with root privileges using PHP. The answer proposed to add the linewww-data ALL=(ALL) NOPASSWD:...

Asked on 12/26/2020 by UserK

4 answer

Web Cache Deception - exploitable without a cache server?

Is Web Cache Deception vulnerability exploitable if there is no cache server involved? If we are not using a cache servers or a CDN to serve the...

Asked on 12/26/2020 by Citylight

1 answer

Determine if private key belongs to certificate?

Given a certificate¹ and a private key file², how can I determine if the public key on the certificate matches the private key? My initial thought was to simply encrypt...

Asked on 12/25/2020 by Thanatos

3 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP