Find answers to your questions about Information Security or help others by answering their Information Security questions.
Question #1 Does changing the Default Impersonation Level in WMI to "anonymous" or "identify" help mitigate against WMI exploitation, implants, and persistent threats on a local machine? If so, please...
Asked on 10/28/2021
0 answerI'm in the UK. In order to top up a pay-as-you-go SIM card, I had to first ring the mobile network to associate my bank card with the SIM before...
Asked on 10/28/2021
1 answerIf I can change my password with cmd net user example * without needing to confirm my old password, why, when I change my password in the usual way (via...
Asked on 10/28/2021 by Stalemate
2 answerMy team is responsible for the creation and management of many passwords (hundreds), which we do almost exclusively programmatically (all generation is random-enough). We leverage a variety of of...
Asked on 10/28/2021 by thump
4 answerI'm making an webapp which have to maintain some user specific data, so authentication is needed. My app is not anything mission critical. As this is the case, I thought...
Asked on 10/28/2021
1 answerThe password manager 1Password has a feature where multiple accounts in a group ("family") can share login information with each other. From my understanding, a password manager is never supposed...
Asked on 10/28/2021
2 answerI'm currently practicing buffer overflows, but there is one thing I don't understand yet. I have read this similar question. I understand that if you don't know the address...
Asked on 10/28/2021 by Maikkeyy
2 answerSuppose I create an encrypted container using VeraCrypt and want to upload it to Google Drive/One Drive for storage. The container is encrypted with AES-256. I know that no one...
Asked on 10/28/2021
3 answerMy question refers to a behavior on a production system with more than 100 million chat users. Some time ago I changed my account password and removed all devices connected...
Asked on 10/28/2021
0 answerI am building an API and trying to follow the 12 Factor App methodology. Using Docker, the methodology says containers must be disposable. Assuming the API will have high traffic,...
Asked on 10/28/2021 by flexi
1 answerGet help from others!
Recent Answers
Recent Questions
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP