Find answers to your questions about Information Security or help others by answering their Information Security questions.
I usually do the technical part of security, so I'm not familiar with security policy area. Risk assessment (measurement and evaluation) is always taken in an organization, such as to...
Asked on 12/06/2020 by TJCLK
4 answerFirst off, I am no security expert! Yesterday I registered a .cf domain, I needed it for about 10 minutes. About 5 minutes after domain registration I got over 100...
Asked on 12/02/2020 by user182663
1 answerI can try some SQL-injection against a ad-hoc damn web application in my virtual enviroment for educational purpose.In one of these I obtain the table column_privileges (of Mysql Information...
Asked on 12/01/2020 by Bob
1 answerI am trying to restrict the intermediate CA to sign only end user certificates. However, I am not able to do so. Man page of x509v3_config saysbasicConstraints=critical,CA:TRUE, pathlen:0 A CA...
Asked on 12/01/2020 by cpp_enthusiast
2 answerI am trying to use msf word-lists but I just noticed in usr/share/metasploit-framework there are only two folders lib and config. I am not sure how that happened but my...
Asked on 11/30/2020
1 answerI don't know all the details of Spectre and Meltdown, but the way I understand it is that they allow reading from memory, not writing to it. Also, I read...
Asked on 11/29/2020
1 answerI'm very interested in purchasing or manufacturing this device on my own and maybe using it in conjunction with Tails/Tor: https://samy.pl/proxygambit/ According to the site: ProxyGambit...
Asked on 11/28/2020 by piece0fshite
1 answerCommonly used cryptosystems like RSA or ECC, on the other hand, willbe broken if and when quantum computers become available. - https://tbuktu.github.io/ntru/How can we introduce NTRU...
Asked on 11/17/2020 by rubo77
3 answerMy goal is to create a docx file that, when uploaded to a server and parsed there, causes the parser to fetch my url so I know it worked. Unfortunately,...
Asked on 11/05/2020 by Sorokine
1 answerI was in a workshop about privacy recently and at some point, a passionate debate started about Intel's Software Guard Extensions (SGX). Although I have a security...
Asked on 11/04/2020 by Aventinus
1 answerGet help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP