The protection of computer systems and information from threats such as theft or data destruction.

1
vote
2answers
106 views

Disable “These files might be harmful to your computer” message for home server (Win10)

I've just set up a small home server, and I'm getting a "These files might be harmful to your computer" message whenever accessing files on it. The solution I've found is to edit my internet options ...
1
vote
2answers
312 views

Is Firefox really that insecure for not having sandbox like Chrome? [closed]

I am now using Firefox instead of Google Chrome for daily use, however I read in some sites that Firefox lacks in security while being better at privacy and Chrome the other way around. Is Firefox ...
0
votes
1answer
71 views

Asterisk securing passwords

I am running asterisk on the raspberry pi 3; therefore, I want to protect the passwords. Someone can remove the SD card and the passwords will be in plain text! I know I can encrypt the entire OS but ...
0
votes
1answer
30 views

Active directory audit

I'm trying to know what is changing one of the attribute in my active directory. Some email addresses (attribute : Mail) are changed and nobody seems to know why. I created an audit policy in ...
0
votes
1answer
115 views

Meltdown and Spectre: practical advantages and disadvantages for users? (security and performances) [closed]

I was guessing which could be the practical downsides of the patches for these risks and also if a user decides to not apply these patches.Preamble:In the middle of January I bought a refurbished ...
0
votes
1answer
40 views

Being ddos-ed or my VPS has been compromised?

VPS bandwidth was suspended due to over usage. Didn't really promote my website at all cus it is still under development.Installed IFTOP and below is what I have captured. Any advice is greatly ...
-1
votes
1answer
33 views

is anvir task manager using your WiFi

Anvir task manager used to have a free and pro version. I have used the pro version for quite some time and needed to reinstall on a new PC, but see on their site: https://www.anvir.com that there is ...
1
vote
0answers
24 views

RST hijacking good ACK number

I'm trying to perform a RST hijacking sur on my Virtual Machine. I have 3 Vm's:-attack : 172.10.10.11-victim : 172.10.10.21-pirate : 172.10.10.31First, I connect from attack with telnet to the ...
1
vote
1answer
112 views

Bypass UAC by using Remote Desktop to connect to localhost?

I can use Remote Desktop (RDP) to connect to computer B from computer A without typing my password, and vice versa, because I use the same account on these two computers. Further, in a remote desktop ...
1
vote
0answers
35 views

How do I get the unsigned-installer warning back?

I'm developing an application for Windows and I want to sign it so that my customers don't see the scary warning when they are about to install it. My problem is that I don't see the scary warning on ...
2
votes
1answer
144 views

OpenWrt/LEDE setup for SFTP

I want to use my router (A TP-Link WDR3600) running LEDE 17.01.4 as an SFTP server to store my backups created with borg. I already know how to perform backups and set up a USB drive, what I don't ...
0
votes
1answer
1k views

Self destruction messages with timer/auto delete for xmpp

Is it possible to set some kind of expiration date for a message? Example: I send a message M to user U and 1 day after U read the message, it should be deleted from his account/device. Some public ...
2
votes
2answers
140 views

How to open PDF files safely

I'm going to be running an online business which will involve reviewing PDFs submitted by unknown users . How can I ensure my safety when opening PDFs. Edit:I already have antivirus softwarenote: ...
3
votes
1answer
26 views

Security by encrypting a hard drive without additional PIN when using Windows Truecrpyt?

Does encrypting a hard drive containing sensitive information in a PC via Windows Truecrpyt without entering an additional Truecrpyt PIN during boot (the default behavior) protect the data on a hard ...
0
votes
1answer
50 views

Does my ISP know what sites I have visited if I am using Tor?

For Example:You -> Tor Entry node -> Tor Middle Node -> Tor Exit Node -> WebsiteThe website i visiting only sees the IP address of the Tor Exit Node right ?but which one isp sees ? tor entry node ?...
0
votes
1answer
23 views

Does FIlezilla (or FTP in general) have any sniffer protection?

Is possible track credentials of a normal Filezilla connection (no SFTP) in the same wifi with methods like "Man in the Middle", or the program have any security about this?
1
vote
0answers
39 views

Unidentified phone on network

I have an on my network. It does not belong to me or anyone else I know. Is this a problem? Does this just mean that my network can detect a nearby phone or should I be worried that someone has ...
0
votes
0answers
23 views

Is it safe to store the encrypted private key of a RSA pair on the same machine as the encrypted data?

I was not sure how to google this.I want to set up a storage server where I encrypt everything that is sent to it, from anywhere. The files sent to it would automatically get encrypted by the public ...
0
votes
1answer
203 views

Internet Options to add Trusted Site Greyed Out - SysPreped Windows 10 LTSB

I just deployed an custom Windows 10 ISO I created and I can't set my local file server as a trusted site in internet options. The site button is greyed out. The only change I made in the image was ...
0
votes
0answers
40 views

Limit ssh public key to git only

I want to restrict the capabilities of the users connecting through ssh to my server. Besides giving those users limited permissions, I want to add an extra layer of security as explained in this ...
2
votes
0answers
80 views

Chrome 65 download security bug/error

I wanted to download a signature file from a trusted source.It is normal that this little warning pops up, but normally there is a button to accept the download. But since i use Chrome 65 there is ...
1
vote
1answer
57 views

Security and privacy of WhatsApp via Wi-Fi and in airplane mode

If my mobile phone is in airplane mode, and afterwards I activate the Wi-Fi in order to connect myself to a Wi-Fi network; is there any way for the ISP to know that my WhatsApp account (hence my phone ...
3
votes
1answer
8k views

“Trojan:Script/Cloxer.A!cl”, any info on this virus? what does this virus do? [duplicate]

Windows Defender identified and removed a threat on my Win10Pro PC called "Trojan:Script/Cloxer.A!cl". But there is no information on the web on this trojan, searching for this yields little/nothing. ...
0
votes
0answers
54 views

Recurring certificate “Secutiry alert” on Windows

Windows 10 is showing me a security alert windows again and again and again.If sayThe identity of the web site or the integrity of its connection cannot be verified.~Certificatte was issued by a ...
0
votes
0answers
90 views

Installer Error 1721 - Win 10 won't allow writing a file component, possibly permissions?

Out of thousands of Windows 10 clients, ONE USER running Windows 10 Home Edition gets an error from our Installshield-created installer:Error 1721. There is a problem with this Windows Installer ...
0
votes
0answers
12 views

Centos 7 , API calls makes IP banned

I have this problem with multiple cents 7 servers. When users make tomany calls (via API, e-mail or ssh) the server automatically bans the IP for X time. I already setup CSF + Fail2Ban, changed 'max ...
1
vote
1answer
88 views

Erase all sensitive Google Chrome data from a Windows PC

I want to pass my Windows 8 PC to a different person. There are some sensitive data on that PC, mainly Google Chrome data. (Stored website passwords, cookies, local/session storage, probably something ...
0
votes
1answer
30 views

Exposing resources from my home server

I have a small VPS (Ubuntu 16.04) that I use for hosting of a few personal websites, ownCloud, etc. It's fairly slow and doesn't have a lot of storage. I'd like to offload the ownCloud storage and ...
0
votes
0answers
31 views

Virtual machine work on only one system?

How can I make a virtual machine to run only on one system(Virtual box or Vmware)?Is there any way to make it system hardware dependent?
0
votes
1answer
289 views

For Windows 10 update, what are the IP address for firewall?

I have strict network where windows 10 updates failing because of strict firewall settings in Cisco/Juniper. What are the microsoft ip ranges for windows 10 updates?
2
votes
1answer
160 views

fail2ban not catching SMTP password brute force attack

Spammers are running brute force password guessing attacks on my server (postfix on Debian). They have already guessed two user's passwords and started sending spam using my server. Passwords changed ...
0
votes
1answer
35 views

Do I need a keyring password on a luks encrypted single user machine?

The title says it all but let me expand a bit more:I'm wondering how the keyring password is protecting my keys. Sure, it encrypts the container file, so no one else can access it. But it is also ...
0
votes
1answer
75 views

How do I manually clone a wifi access point?

I am running a powerline signal extender. Without further modification I now have two access points, one at the router and one at the extender, with different SSIDs.I want to clone the router so ...
0
votes
0answers
158 views

Chrome automatically blocking microphone

I'm trying to test out SpeechRecognition API on my website (which requires microphone use), but because of the policy, Chrome is automatically blocking microphone.First thing i tried was enabling it ...
0
votes
1answer
85 views

Why do programs start working when I open Process Monitor?

I have a script I wrote that creates and writes to a file every 20 or 30 seconds and it has been doing that fine for the past 15 years or so on 5 versions of Windows, but I installed the outstanding ...
0
votes
1answer
32 views

Where does the content of an open encrypted image end up on Mac?

I have files stored in an encrypted image (DMG) on my Mac to keep them safe from snooping eyes, but a thing hit me: when I decrypt the image by opening it... where does the decrypted information end ...
0
votes
1answer
36 views

Win7Pro: Capturing a photo and recording voice when someone failed to login

I'm looking for a solution to capture a photo by internal camera and recording voice by mic of laptop when someone failed to login my Laptop of companies. Because, Somebody did removed my password ...
1
vote
2answers
81 views

Internet Explorer cannot open sites on Windows 2003

I have a server with Windows Server 2003. I have this issue, I have turned enhanced security off, I lowered all security settings in IE, however I can open only Microsoft Update and Bing, as they were ...
0
votes
1answer
105 views

Can any SSL certificate can be used for client certificate authentication purpose?

I am trying to connect to a third party API which have a mutual TLS authentication setup enabled. So I am supposed to install my client certificates inside my key store and send it on TLS handshake ...
-2
votes
1answer
28 views

Understanding my security log

Can someone please explain what this entry in my security report means?The pc (#) tried to connect to UPD port (?) on your PC without your permission.The source ip address is your own ...
0
votes
0answers
12 views

Can I calculate a git tag hash from the source tree?

Given a git project, I can checkout to the tree at a tag. This tag has a hash associated with it. How is this hash calculated? Can I hash the source tree in some way to get this hash?
3
votes
1answer
82 views

Security breach in the UK - who to report [closed]

I came across a company in the UK (I was just a consumer) whereby they were handling sensitive information in an insecure way. Who would be the best people to notify about problems with security?
-2
votes
1answer
158 views

Evil Twin Access Point? Am I being hacked? Two identical wifi routers

I have noticed that when I go to connect to my wifi on my home network, a new Wifi appeared with identical signal strength but with the addition of the number 2 in the wifi name. Both are encrypted ...
0
votes
1answer
56 views

Proceed to localhost (unsafe) causes HTTP ERROR 403

l am using local-ssl-proxy(a js module) to test ssl in the development environment.When l head to https://localhost, it's a unsafe connection. l click "ADVANCED" and then "Proceed to localhost (...
0
votes
1answer
53 views

What does it mean to get such a high TCP packet

In a typical home network setup containing only a modem & one pc (freshly installed with windows 10, checksum validated), no wireless. The speed download limit is 2 Mbits. How could I get such a ...
0
votes
2answers
56 views

Possible security issue with NIS, or am I just misunderstanding?

I am working in a virtual machine that can communicate with my organization's NIS server. I don't have much experience with it, but I've noticed that I can become another user from my host without the ...
1
vote
1answer
385 views

I may have a keylogger on my desktop, but am unsure

I recently discovered one of my online accounts had been hacked, nothing major yet, but I'm concerned I may have a keylogger on my Windows 10 desktop. It stirred me into a panic and I immediately ran ...
0
votes
0answers
34 views

Possibility of duplicating keys generated with Linux crypto API

We are looking for possibility of duplicating cryptographic keys generated on a Linux box using the the Linux Crypto API. We are thinking from a (paranoid) security practitioner perspective whether it ...
7
votes
2answers
311 views

Increase security for remote desktop machine - use 2FA and/or limit to LAN connection only?

I'm looking at setting up Windows remote desktop on a W10 Pro machine.I'd like to increase the security on the connection and wonder if any of the following are possible:A password, different from ...
2
votes
3answers
153 views

Can a simple static http website not be secure?

Question is in the context of the recent Google announcement that it will soon add a “not secure” warning to all HTTP websites. My website is HTTP and is not much more than a simple “Hello, World!” ...

153050per page