Find answers to your questions about Information Security or help others by answering their Information Security questions.
I'm trying to sign a CSR using python-asn1crypto and python-pkcs11. I have an ECC Keypair stored in a Hardware Security Module (HSM). Here's a code sample:key = decode_ec_public_key(encode_ec_public_key(pub))info =...
Asked on 12/28/2021
2 answerI'm trying to understand and perform the Prefetch Side-Channel Attacks:Bypassing SMAP and Kernel ASLR. The author have released the proof-of-concept code.I'm trying to...
Asked on 12/28/2021
0 answerI'm running a Counterstrike server on UDP port 27015. I'm using Amazon AWS to host the game server. I have added only my friends' IPs (about 50 of them) into...
Asked on 12/26/2021 by Nihas
4 answerOur EDI VAN provides software to transmit sensitive customer and business data between our ERP and their website. This software requires that I add several URLs (including one plain HTTP)...
Asked on 12/26/2021
1 answerEverything earlier used to work fine. However, recently I downloaded a newer virtual device on Genymotion, which is an Android 8.0 API 26. I have been struggling to get HTTPS...
Asked on 12/26/2021 by qre0ct
0 answerI was recently testing for Clickjacking and when I opened developer tools, I was warning Content Security Policy: Ignoring “'unsafe-inline'” within script-src or style-src: nonce-source or hash-source specified Do you...
Asked on 12/26/2021
1 answerI used .asc for ASCII armored (using --armor) encrypted messages. But what extension should I use when encrypting file.tar.gz for example?...
Asked on 12/26/2021
1 answerI'm trying to figure out if an SQLi for the following PostgreSQL/Java code exists.public void availableItems(String name) { return this.query("SELECT * FROM items WHERE name='"+name+"'");}Assuming that in the...
Asked on 12/26/2021 by asker asky
1 answerAs far as I've read, there is no benefit of a MAC over a digital signature - except the fact that it is faster to generate and process. Is this...
Asked on 12/24/2021
3 answerThe clients can use Google and Facebook OAuth for authenticationI need to implement a chat application where the messages are end-to-end encryptedWhen the user changes device, the client should be...
Asked on 12/24/2021 by user238973
0 answerGet help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP