TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 8)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

Detecting a web based MITM attack?

I've been looking into ways to detect a Man In the Middle attack, when the client has "duped" into trusting third party CA. Examples of this are, anti-virus applications...

Asked on 11/11/2021

0 answer

What is the Akamai Name Server I see for some big companies?

I have played with DNS a lot lately, and I have found that some big companies' web sites use the Akamai NS as the Name Server for their WWW servers,...

Asked on 11/11/2021 by Hanan N.

3 answer

What are ssh-keygen best practices?

Most users would simply type ssh-keygen and accept what they're given by default. But what are the best practices for generating ssh keys with ssh-keygen? For example:Use -o for the...

Asked on 11/11/2021

4 answer

How can I safely use Get-Credential to obtain a username and password for a set period of time for use as command line arguments?

Credentials in the form of SSH keys can be stored in memory using SSH Agent; However, if clicking the wrong link, or running a malicious program they can also...

Asked on 11/11/2021

0 answer

Can my physical location be detected with double VPN?

My company's laptop has a VPN installed that connects to the company's network. No other VPN software can be installed. However, I have a VPN router that has ExpressVPN installed...

Asked on 11/11/2021

2 answer

How does openvpn work for only certain servers?

I got a *.openvpn from work and I monitored the traffic on wireshark.On my normal vpn every traffic is routed via the vpn (as expected). But with this work...

Asked on 11/11/2021 by relot

1 answer

If you SMS text someone, how much more information will they know about you?

If I send someone a text, how much information am I giving up? Could they add me to an app like Whatsapp and access my name and profile? Or does...

Asked on 11/11/2021

2 answer

An intranet web app for decrypting values : a bad idea, and if so, why?

We have to protect a database connection string for a .NET desktop application that has an application-level database user. One option is to encrypt a section of the app.config using...

Asked on 11/08/2021

1 answer

How can a company ensure cybercriminals destroy hacked data after payment?

Cloud computing provider Blackbaud reported on https://www.blackbaud.com/securityincident "...the cybercriminal removed a copy of a subset of data from our self-hosted environment. ... we paid the cybercriminal’s demand with...

Asked on 11/08/2021

7 answer

Security camera NVR is making my network not PCI compliant. What can I do?

So family operates a small bar/lounge in Florida and I work for them part time as a bar back / IT technician. For the past couple months we have been...

Asked on 11/08/2021 by shywolf91

2 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP