TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 12)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

Whatsapp suspicious message

Received a message from an unknown individual on WhatsApp messenger. I did not recognize the number (the person is not on my contact list), and there is probably an attachment...

Asked on 10/28/2021 by PerpetualLearner

1 answer

How can we limit access to a single computer?

We would like to limit access to our web servers (and eventually other services on the computer) to individuals that have been authorized access. Of course we don't trust passwords...

Asked on 10/28/2021 by Duane Murphy

1 answer

Effect of Firefox's "Responsive Design Mode" on the browser's fingerprint

Today I switched ON the "Responsive Design Mode" under the "Web Developer" Section of the Firefox menu, and from the dropdown menu selected "iPhone X/XS iOS 12". So now every...

Asked on 10/28/2021

1 answer

I accidentally downloaded a .bin file, should I be worried?

I accidentally downloaded a .bin file on my computer, but I didn't click on it or open it. I did use my virus scanner to scan it (result: no threats)...

Asked on 10/28/2021 by iknownaught

1 answer

Is there a security vulnerability in setting a public DNS entry to a private IP Address?

I recently set up a wireguard server-network configuration with a home server and client devices. I have one main domain that I hope to route everything through via subdomains (in...

Asked on 10/28/2021 by Will Pike

1 answer

Secure a virtual machine during a lab exercise

I recently started the Offensive Security AWAE course.On their connectivity guide page, they warn about the hazards of connecting to their labs:you will be exposing your...

Asked on 10/28/2021 by Martin Fürholz

2 answer

HTML Injection to blind SSRF testing retrieves only DNS Query

I recently came across an application that was vulnerable to HTML injection on the invite function. When I insert <img src="image.jpg"> the image got rendered on the mail I received....

Asked on 10/28/2021 by None_None

0 answer

Plausible reason for a VPN to point to a country different to the one you are connected to?

I am using NordVPN, but I believe this applies to VPNs in general. For some time now, I have been worried about the reliability of my VPN provider, especially because...

Asked on 10/28/2021

0 answer

Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out(remote host ip)

I keep getting this when I start to exploit, trying to exploit my xp machine but this keeps happening, I can not find the fix anywhere, I don't believe...

Asked on 10/28/2021 by This Is Edis Mehmedovic

4 answer

What is the purpose of frequently rotating TLS certificates without changing underlying keys?

I read in the OWASP cheat sheet regarding certificate / public-key pinning that “Google rotates its certificates … about once a month … [but] the underlying public keys …...

Asked on 10/28/2021 by Arran Schlosberg

3 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP