TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 6)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

Can firewalls decrypt SSL packets?

I was wondering if the firewall has the ability to decrypt the SSL traffic. If so, the network admin is able to read the data in clear text at...

Asked on 11/30/2021 by IanCool

3 answer

Associate API key with user

I am creating a public API that will require API key authentication. When a user wants to register a new API key, they send a request to one of our...

Asked on 11/30/2021 by Brad Stevanus

3 answer

Trusting CA Certificates by Thumbprint

Id like to create an application which trusts certificates issued from specific CAs. My ideas is to have a list of thumbprints for CA certificates I trust. Then whenever my...

Asked on 11/30/2021 by houtanf

1 answer

Device authentication, common method

What are some standard device authentication methods, in a scenario when:The desktop computer is being authenticated on web serviceI provide the .exe on the desktopI control the web serviceThe desktop...

Asked on 11/28/2021

1 answer

Should I contact the manufacturer if their product allows access to other users' location information?

I recently purchased a satellite communicator that allows me to send a map of my location to friends and family while I'm hiking in the wilderness. While testing out my...

Asked on 11/25/2021 by Lil' Bits

10 answer

What are the roles of the "PACKAGER" in a digital rights management system?

I am studying about the basics of DRM systems. I recently discovered that the term packager is the application that encrypts the original content from the creator. Is there any...

Asked on 11/25/2021

1 answer

How does Google track users in Incognito mode?

There is a lawsuit claiming Google tracks users in private browsing mode. How exactly is Google achieving this?...

Asked on 11/25/2021

2 answer

Polymorphic Analysis

I'm a beginner at malware analysis. For my research studies, I have to identify polymorphic malware based from experiments. I would like to know if there are any guides showing...

Asked on 11/23/2021 by user109889

1 answer

How exactly can an infected Samsung TV record private conversations in a room?

We can read on Wikipedia page (about Weeping Angel) that Samsung smart televisions can be hacked by hackers which allows them to record conversations in the room...

Asked on 11/23/2021

2 answer

Getting the hostname of devices in the local lan

I'm trying to get the hostnames of devices on my LAN. This network is not a Windows network. Up until now I was able to sniff DHCP requests and extract...

Asked on 11/23/2021 by Gilad Naaman

0 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP