TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 23)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

How are USSD messages used and who could send them?

Some illegal ads started showing up on my Android phone as message boxes recently. They are said to be "USSD messages" in an app recording notifications (com.evanhe.nhfree). There is ...

Asked on 08/04/2020 by user23013

1 answer

What's a secure way to generate a keypair from a secret password?

I like to generate a public-private key pair that is seeded from a string. So having the string and the generation algorithm is enough to recreate the keys. I want...

Asked on 07/29/2020 by HappyFace

1 answer

What does EIP stand for?

There are a ton of questions on here that make reference to the eip:How can I partially overwrite the EIP in order to bypass ASLR?Unable to overwrite EIP...

Asked on 07/27/2020 by Ares

3 answer

XSS possibility in user isolated app?

By user isolated, I mean that users interact with server and have some personalized data and they can read, update, delete their data but they will never see another user...

Asked on 07/25/2020 by Mani Bharathy

1 answer

How to set up the Tor browser on Linux Mint in a VM with a VPN on the Host

(Forgive me, I don't know whether to post this here for in the "Tor" community) I'm brand new to Tor, I understand the basics of how it works and the...

Asked on 07/22/2020 by Ultra Gamer

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP