TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 21)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

How a risk assessment impacts information security policy?

I usually do the technical part of security, so I'm not familiar with security policy area. Risk assessment (measurement and evaluation) is always taken in an organization, such as to...

Asked on 12/06/2020 by TJCLK

4 answer

over 100 scanner requests 5 min after domain registration

First off, I am no security expert! Yesterday I registered a .cf domain, I needed it for about 10 minutes. About 5 minutes after domain registration I got over 100...

Asked on 12/02/2020 by user182663

1 answer

Mysql Information schema column_privileges empty

I can try some SQL-injection against a ad-hoc damn web application in my virtual enviroment for educational purpose.In one of these I obtain the table column_privileges (of Mysql Information...

Asked on 12/01/2020 by Bob

1 answer

x509 restrict the intermediate CA to sign only end user certificates

I am trying to restrict the intermediate CA to sign only end user certificates. However, I am not able to do so. Man page of x509v3_config saysbasicConstraints=critical,CA:TRUE, pathlen:0 A CA...

Asked on 12/01/2020 by cpp_enthusiast

2 answer

why my Metasploit folder does not have wordlists folder (usr/share/)?

I am trying to use msf word-lists but I just noticed in usr/share/metasploit-framework there are only two folders lib and config. I am not sure how that happened but my...

Asked on 11/30/2020

1 answer

Mitigation of Spectre and Meltdown affecting host OS from guest OS (Virtualbox)

I don't know all the details of Spectre and Meltdown, but the way I understand it is that they allow reading from memory, not writing to it. Also, I read...

Asked on 11/29/2020

1 answer

How effective is the ProxyGambit at allowing access to the internet without revealing true location and IP?

I'm very interested in purchasing or manufacturing this device on my own and maybe using it in conjunction with Tails/Tor: https://samy.pl/proxygambit/ According to the site: ProxyGambit...

Asked on 11/28/2020 by piece0fshite

1 answer

NTRUEncrypt in TLS and GPG encryption

Commonly used cryptosystems like RSA or ECC, on the other hand, willbe broken if and when quantum computers become available. - https://tbuktu.github.io/ntru/How can we introduce NTRU...

Asked on 11/17/2020 by rubo77

3 answer

XXE Injection in docx: entity not defined

My goal is to create a docx file that, when uploaded to a server and parsed there, causes the parser to fetch my url so I know it worked. Unfortunately,...

Asked on 11/05/2020 by Sorokine

1 answer

What are the concerns, or drawbacks, regarding Intel's SGX when it comes to privacy?

I was in a workshop about privacy recently and at some point, a passionate debate started about Intel's Software Guard Extensions (SGX). Although I have a security...

Asked on 11/04/2020 by Aventinus

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP