TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 18)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

Step by step protocol for complete system wipe (suspecting persistent backdoor)

I have reason to believe that there is a persistent backdoor on my device, one which is not removed after a re installation of the OS. I wanted to know...

Asked on 01/13/2021 by joshnow

1 answer

Is XSS possible when using htmlspecialchars and https prefix check in href?

There is a standard XSS exploitation technique where one can use javascript keyword in <a href=""> to execute javascript code. Example:<a href="javascript:alert(42);">please clickme</a>Let's us consider PHP code which uses...

Asked on 01/12/2021 by Awaaaaarghhh

1 answer

Can an empty, but used, usb flash drive that has NO firmware within it be infected with malware?

QUESTION: Can an empty, but used, usb flash drive that has NO firmware within it be infected with malware? I have been told by a networking and security expert that...

Asked on 01/10/2021 by 888.999

2 answer

XKCD #936: Short complex password, or long dictionary passphrase?

How accurate is this XKCD comic from August 10, 2011? ...

Asked on 01/09/2021

22 answer

Sqlmap and multipart/form-data forms

I'm working on some security for a website that is built in classic ASP and MS SQL 2000. I've successfully found a couple of flawed forms that allowed SQL injections...

Asked on 01/08/2021 by Brigante

2 answer

Shared Text Content - XSS Safe

I have a bulletin on my site that all valid users have access to (read and write). User input posted to this bulletin is stored in JSON. Because of these...

Asked on 01/08/2021 by Newb 4 You BB

1 answer

Deciding the kind of key required for implementation of monitoring software

Different companies seek permission to start and run, from our organization. I am approval or permission-giving authority. I am having an inspector who goes to different places and visits companies...

Asked on 01/06/2021 by Olle Hudga

0 answer

Wrapped Key Encryption - Hide AES secret key in Javascript & Java

I need to encrypt some sensitive fields back and forth in browser and server, same goes for decryption, for this I am planning to implement AES algorithm, but the problem...

Asked on 01/06/2021 by Jian25

0 answer

What is the impact of an exposed secret key for a JWT token implementation?

I am currently using JWT implementation for the authentication part of my APIs. A private key is used to sign the token generated and used to make sure...

Asked on 01/04/2021 by darren19824

3 answer

How do sites detect credential sniffing, and what is the purpose of this attack?

I just got an email from the Unsplash service telling me that someone had logged into my account via credential sniffing: ...

Asked on 01/04/2021

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP