TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 11)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

Hardening WMI: Any security benefit to changing Impersonation level & separately, setting 'Winmgmt Standalonehost?'

Question #1 Does changing the Default Impersonation Level in WMI to "anonymous" or "identify" help mitigate against WMI exploitation, implants, and persistent threats on a local machine? If so, please...

Asked on 10/28/2021

0 answer

Is inputting credit card numbers over a mobile phone secure?

I'm in the UK. In order to top up a pay-as-you-go SIM card, I had to first ring the mobile network to associate my bank card with the SIM before...

Asked on 10/28/2021

1 answer

Why does Windows not always force me to confirm my password when changing it?

If I can change my password with cmd net user example * without needing to confirm my old password, why, when I change my password in the usual way (via...

Asked on 10/28/2021 by Stalemate

2 answer

Is password strength exclusively a function of character set size multiplied by password length-in-characters?

My team is responsible for the creation and management of many passwords (hundreds), which we do almost exclusively programmatically (all generation is random-enough). We leverage a variety of of...

Asked on 10/28/2021 by thump

4 answer

How secure is (permanent) cookie-only authentication?

I'm making an webapp which have to maintain some user specific data, so authentication is needed. My app is not anything mission critical. As this is the case, I thought...

Asked on 10/28/2021

1 answer

How does a shared vault in password managers such as 1Password work?

The password manager 1Password has a feature where multiple accounts in a group ("family") can share login information with each other. From my understanding, a password manager is never supposed...

Asked on 10/28/2021

2 answer

Are call stack addresses predictable with all protections disabled?

I'm currently practicing buffer overflows, but there is one thing I don't understand yet. I have read this similar question. I understand that if you don't know the address...

Asked on 10/28/2021 by Maikkeyy

2 answer

Preventing access to encrypted files at all

Suppose I create an encrypted container using VeraCrypt and want to upload it to Google Drive/One Drive for storage. The container is encrypted with AES-256. I know that no one...

Asked on 10/28/2021

3 answer

Deauthorization Bug in messenger application - How serious is this?

My question refers to a behavior on a production system with more than 100 million chat users. Some time ago I changed my account password and removed all devices connected...

Asked on 10/28/2021

0 answer

How do I share secret key files with Docker containers following 12 Factor App?

I am building an API and trying to follow the 12 Factor App methodology. Using Docker, the methodology says containers must be disposable. Assuming the API will have high traffic,...

Asked on 10/28/2021 by flexi

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP