The protection of computer systems and information from threats such as theft or data destruction.

learn more…| top users | synonyms (1)

-1
votes
1answer
22 views

Is it a good idea to disable “write caching on the device” in windows 7?

Is it a good idea to disable "write caching on the device" in windows 7?Right now write caching is enabled (which was apparently the default).I am working on a 90 pound weakling, a small Acer ...
0
votes
1answer
24 views

Disable shortcut “Control+N” on Windows 7

The problem that I want to solve is I have made one software on Windows: The software allow the user to use only this software on the computer. But when the user wants to load a file from mysoftware , ...
0
votes
0answers
17 views

Generate OpenSSL configuration file from certificate

I have a certificate and I want to create an OpenSSL configuration file from it (I'm trying to follow the workaround here). Is there any automatic way to do it?I mean, from an X509 certificate, ...
0
votes
1answer
23 views

How safe is an edited file? [on hold]

I didn't find any questions regarding this at all...but I was wondering: Is there a way for an attacker to rebuild information that was saved in a file at any earlier time?Possible Scenario: ...
0
votes
1answer
16 views

Is SSL needed for a public FTP server?

I'm going to host a public FTP update server (vsftpd on CentOS 7). Devices (dvr recorders) connect to the server with username anonymous and no password to check wether they have the latest firmware. ...
0
votes
0answers
22 views

How can I find out if there are keyloggers on a Mac? [duplicate]

Is there a way I can check what all applications are watching key presses on a Mac? The intention is to find out which applications are snooping and to ensure that passwords are safe.
0
votes
0answers
30 views

How does reading kernel memory translate into stealing passwords with meltdown vulnerability?

I have basic understanding of OS and I understand the mechanism of the meltdown vulnerability but I need some help to filling in the blank between reading kernel memory and stealing user passwords....
0
votes
1answer
60 views

Securely sharing a folder on a wifi network

I was successfully able to share an external hard drive between my mac and Windows machine over wifi by enabling file sharing in the Windows properties of the selected drive (see method HERE). What I ...
-1
votes
2answers
41 views

How can I recover my BitLocker recovery key

my laptop has freezed, I restart it with power button but now, at start up, BitLocker said that:You need to enter your recovery key because Secure Boot has been disabled. Either Secure Boot must ...
0
votes
0answers
7 views

OpenDNS for TP-Link router and PPoE connection

is there any way to use OpenDNS for my TP-Link WDR-3600 with PPoE connection? I contacted my ISP and they said they can't help me in any way with a Dynamic IP, they offer only for web servers and ...
0
votes
1answer
8 views

Active Directory Group Added to TFS Added as a User

We have a TFS 2017 installation using Active Directory that has functioned fine for quite a while now (and continues to function fine except for one group in question).We added a number of groups to ...
0
votes
1answer
44 views

Is it possible to create a user account that cannot modify **any** file on the computer?

The question is quite self explanatory but just to add a few details.The user cannot modify (can read, but can't write/delete) any files on the computer, which includes:Desktop shortcutsFiles on ...
0
votes
1answer
36 views

Effective way to test for performance impacts of Spectre and Meltdown patches on Windows?

Much has been discussed about the potential performance impacts of patching systems for Spectre and Meltdown.What is an effective way to test for performance impacts of Spectre and Meltdown patches ...
1
vote
1answer
115 views

My BIOS is outdated. Will I be affected by Meltdown and Spectre?

I had made the mistake of buying a Lenovo Laptop. The model is Lenovo Flex 2-14.This laptop has a bios from 2014 and Lenovo never issued an update.I've been reading on some major sites that BIOS ...
-1
votes
2answers
24 views

How to trace which JavaScripts are being loaded (Malware in Wordpress)

I'm having trouble with an infected Wordpress website. At random the page is redirected to some shady advertisement. It's similar to the description here: https://blog.sucuri.net/2016/05/wordpress-...
0
votes
0answers
10 views

what should be done to add advance security in webmail server over Linux

i am working through secured WebMail server and aimed at providing extra security.whether i can do that using web server? moreover for online meeting support over Linux what alternate of Lync should ...
0
votes
1answer
41 views

What should I do when a bunch of machines keep trying to SSH into mine?

For the past few hours, a bunch of machines from China (well, supposedly) have been trying to SSH into my machine as root, and failing. Some (all?) of their IPs are:218.65.30.53221.194.47.221115....
3
votes
1answer
2k views

How to Turn Off KPTI to Improve Performance in Fedora

Following the outbreak of KPTI news, I recently updated my kernel to 4.14.11-300. In addition to a quite sufficient RAM (8 GB) and fast IO (SSD disk), I have started to feel remarkable slowdown in my ...
-3
votes
1answer
44 views

Exploiting RSA to access remote computer

as part of an exercise I am supposed to exploit RSA in a way so that I can connect to a remote machine without knowing the password. To accomplish this I have been given a bunch of private and public ...
1
vote
0answers
80 views

What should I do about Meltdown and Spectre vulnerabilities with my Linux system?

I have GNU/Linux running on an (obviously recent enough) Intel CPU. I've heard about the grave security flaws which have surfaced, Spectre and Meltdown, although I haven't read the details yet.I've ...
3
votes
1answer
571 views

Which intel CPUs are affected by spectre/meltdown?

While AMD chips appear to be immune to Meltdown and are apparently largely unaffected by Spectre, Intel chips seem to be broadly affected.Information is scarce on which Intel CPUs architectures ...
0
votes
1answer
68 views

Why wouldn't security flaw affect AMD processor?

According to this news article there's a newly found security flaw in processors. However, the article also claims that it only may affect Intel processors and not AMD ones. I thought they were using ...
0
votes
0answers
36 views

Removing the Malware From Hell [duplicate]

My home server (aging HP Proliant MicroServer, Windows 7 x64) has acquired some Malware from Hell. Turned up in one of those dodgy installers that wraps a legitimate installer in another package, and ...
0
votes
1answer
38 views

How to use secure NTP authentication from Windows client to a Linux Server?

I have a NTP Server running on a Linux (Ubuntu 16.04) box and I also have to securely serve a bunch of Windows Server boxes (2012, 2012 R2 and 2008 R2 mainly). For network equipements and Linux ...
2
votes
2answers
44 views

Can I reliably use `dd` to wipe the root filesystem on a running Linux server?

I have a (physically) remote server I'd like to securely destroy. Unfortunately, the disk is partitioned with a single, large root partition and nothing else. Can I reliably use dd to wipe the device ...
0
votes
0answers
19 views

How can I block emails from an entire domain in kaspersky for linux mail sever

Is it possible to blacklist the entire email addresses from a specific domain name in kaspersky security 8.0 for linux mail servers? any help is greatly appreciated.
2
votes
0answers
71 views

Duplicate files with weird extensions – ransomware?

I'm a little afraid to get bashed since this is super non-specific but this is exactly my problem. I'm finding weird file duplicates on my computer – with the same name as the original file but an ...
-1
votes
0answers
78 views

Windows Defender turned off by group Policy

My PC with Windows 10 Enterprise 2016 LTSB v.1607 installed, automatically restarted for an error (I don't remember the error, I just remember a blue page in Windows style with a sad emoticon face)....
0
votes
0answers
26 views

Make process commandlines invisible to other users

Operating system is Windows 10 Professional or Enterprise. By default, I am able to view the commandline for processes spawned by other users and also the command lines of system processes (using ...
1
vote
0answers
69 views

How to disable forgotten Master password in frozen Samsung Evo 850?

This is hdparm > Security section result :Security:Master password revision code=22616supportedenablednot lockedfrozennot expired: security ...

153050per page