Find answers to your questions about Information Security or help others by answering their Information Security questions.
I visited website B after visiting website A. Upon clicking the search bar on website B, a dropdown menu appeared containing the words I searched on website A. After clearing...
Asked on 12/24/2021
2 answerHow is it possible to create an account in a website with completely different credentials without the website being able to link the user of the first account and this...
Asked on 12/24/2021
2 answerI found that AES has dedicated hardware on most machines. The question is can we use ed25519 to replace AES? Instead of using RSA to encrypt the AES key and...
Asked on 12/24/2021
1 answerI read the following post, and while the questions was specific to SkyRim, the more general answer was that it depends on the game. I wanted to pose a...
Asked on 12/21/2021 by user58446
3 answerI've noticed a number of Windows services required for network connectivity maintain open ports. What can be done to ensure Service functionality without allowing the always-open ports to act as...
Asked on 12/19/2021 by Thelps
1 answerI'm making an e-mail system/client. I'm trying to correctly detect incoming e-mails which can be replied to with PGP encryption. This means finding out their public PGP key. I currently...
Asked on 12/19/2021 by J. Tukes
1 answerThis is an attempt to ask a canonical question as discussed in this old meta post. The goal is to create something helpful that can be used as a...
Asked on 12/17/2021
11 answerMy firewall reports outgoing connection attempts via com.apple.WebKit.Networking to a number of STUN servers (namely, stun.nas.net, stun.node4.co.uk, stun.voxox.com and stun.wwdl.net). This is requested by the Safari (Apple's browser) process. From...
Asked on 12/17/2021
2 answerI have some files on an NTFS USB drive.The files were encrypted on a Windows 10 pc and copied to the USB. I had to completely reinstall Windows on...
Asked on 12/15/2021
1 answerWondering how other organizations manage software update process. We are a startup, were we try to define components owners, which should update them (security updates etc). This does not to...
Asked on 12/15/2021
1 answerGet help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP