TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 13)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

What are the risks of using TLS 1.0 for web applications?

I work with a company that has several web applications available to its customers via HTTPS. Recently, client browsers will not access these web applications due to the HTTPS...

Asked on 10/28/2021 by Stone True

2 answer

Why should browser security be prioritized?

From this answer about browser security:time to update if you really care about securitySo if every other software and functions I need can work on a 32-bit OS, I...

Asked on 10/28/2021

8 answer

Does having Frontend and Backend on the same port any consequences?

I am currently working on a mean application, with an Angular frontend and an express/node backend. Frontend and backend communicate together with a REST API. When I deploy the application,...

Asked on 10/28/2021 by Kepotx

2 answer

Jenkins malicious process identification

I have a Jenkins (v2.120) machine hosted on AWS which has what looks like a malicious process:process has large CPU usagekilling it, respawns it (with same name)restarting machine spawns it...

Asked on 10/28/2021 by Nemanja Martinovic

2 answer

Is there a vulnerability in subdomain redirection, similar to Open Redirect

I found a website that has the parameter post_login_redirect= I can change to any existing and non-exisiting subdomains, but there is no possibility to redirect to another domain. The redirect...

Asked on 10/28/2021 by Tomi Begher

2 answer

Does encrypted content in a database need to be signed?

If a user is logged into a website and they submit sensitive info over HTTPS, which is encrypted and stored in a database, does it matter if the info is...

Asked on 10/28/2021 by Ian Warburton

1 answer

If I am using a VPN with allowed multiple connections can each user/device be able to view traffic of the other user?

If I am using one a VPN Service, but it allows up to lets say 8 devices to connect, are all the devices/users able to view traffic from other users/devices?...

Asked on 10/28/2021 by Alehandro

2 answer

WhatsApp account got "hacked"/hijacked?

I was on a WhatsApp call with my friend (Alice) when the call suddenly dropped. I then immediately opened my chats and noticed an alert in a mutual group that...

Asked on 10/28/2021 by d.a.vorm

1 answer

iCloud deletion

If I delete photos which are stored in iCloud from my phone. (Which is also linked to my iPad) I know the data is then made ‘free space’ but is...

Asked on 10/28/2021 by MP115

1 answer

Difference between Zeek (Bro) and Snort 3

I'm trying to find difference between Zeek and Snort 3. Сan anybody tell me what are the advantages of Zeek against Snort 3?...

Asked on 10/28/2021 by ustavsaat

2 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP