Find answers to your questions about Information Security or help others by answering their Information Security questions.
I was wondering if the firewall has the ability to decrypt the SSL traffic. If so, the network admin is able to read the data in clear text at...
Asked on 11/30/2021 by IanCool
3 answerI am creating a public API that will require API key authentication. When a user wants to register a new API key, they send a request to one of our...
Asked on 11/30/2021 by Brad Stevanus
3 answerId like to create an application which trusts certificates issued from specific CAs. My ideas is to have a list of thumbprints for CA certificates I trust. Then whenever my...
Asked on 11/30/2021 by houtanf
1 answerWhat are some standard device authentication methods, in a scenario when:The desktop computer is being authenticated on web serviceI provide the .exe on the desktopI control the web serviceThe desktop...
Asked on 11/28/2021
1 answerI recently purchased a satellite communicator that allows me to send a map of my location to friends and family while I'm hiking in the wilderness. While testing out my...
Asked on 11/25/2021 by Lil' Bits
10 answerI am studying about the basics of DRM systems. I recently discovered that the term packager is the application that encrypts the original content from the creator. Is there any...
Asked on 11/25/2021
1 answerThere is a lawsuit claiming Google tracks users in private browsing mode. How exactly is Google achieving this?...
Asked on 11/25/2021
2 answerI'm a beginner at malware analysis. For my research studies, I have to identify polymorphic malware based from experiments. I would like to know if there are any guides showing...
Asked on 11/23/2021 by user109889
1 answerWe can read on Wikipedia page (about Weeping Angel) that Samsung smart televisions can be hacked by hackers which allows them to record conversations in the room...
Asked on 11/23/2021
2 answerI'm trying to get the hostnames of devices on my LAN. This network is not a Windows network. Up until now I was able to sniff DHCP requests and extract...
Asked on 11/23/2021 by Gilad Naaman
0 answerGet help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP