TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 3)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

Can a website track your browsing history on other websites?

I visited website B after visiting website A. Upon clicking the search bar on website B, a dropdown menu appeared containing the words I searched on website A. After clearing...

Asked on 12/24/2021

2 answer

How do I access a website on my phone without it being able to determine that it was accessed from the same phone and location?

How is it possible to create an account in a website with completely different credentials without the website being able to link the user of the first account and this...

Asked on 12/24/2021

2 answer

Performance comparison between ed25519 vs AES

I found that AES has dedicated hardware on most machines. The question is can we use ed25519 to replace AES? Instead of using RSA to encrypt the AES key and...

Asked on 12/24/2021

1 answer

Gaming Mods Security Risks

I read the following post, and while the questions was specific to SkyRim, the more general answer was that it depends on the game. I wanted to pose a...

Asked on 12/21/2021 by user58446

3 answer

How to protect open ports for Services/Programs needed for network connectivity?

I've noticed a number of Windows services required for network connectivity maintain open ports. What can be done to ensure Service functionality without allowing the always-open ports to act as...

Asked on 12/19/2021 by Thelps

1 answer

What is the standard way, if any, to announce via e-mail that you have a public PGP key and what it is?

I'm making an e-mail system/client. I'm trying to correctly detect incoming e-mails which can be replied to with PGP encryption. This means finding out their public PGP key. I currently...

Asked on 12/19/2021 by J. Tukes

1 answer

Help! My home PC has been infected by a virus! What do I do now?

This is an attempt to ask a canonical question as discussed in this old meta post. The goal is to create something helpful that can be used as a...

Asked on 12/17/2021

11 answer

Is it advisable to accept STUN server connections?

My firewall reports outgoing connection attempts via com.apple.WebKit.Networking to a number of STUN servers (namely, stun.nas.net, stun.node4.co.uk, stun.voxox.com and stun.wwdl.net). This is requested by the Safari (Apple's browser) process. From...

Asked on 12/17/2021

2 answer

Recovering NTFS encrypted files from a USB drive on a different machine

I have some files on an NTFS USB drive.The files were encrypted on a Windows 10 pc and copied to the USB. I had to completely reinstall Windows on...

Asked on 12/15/2021

1 answer

Software update process (dependencies) in organization

Wondering how other organizations manage software update process. We are a startup, were we try to define components owners, which should update them (security updates etc). This does not to...

Asked on 12/15/2021

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP