The protection of computer systems and information from threats such as theft or data destruction.

0
votes
0answers
22 views

will disable the sticky keys prevent sethc hack?

I read about lots of articles about sethc hack and prevention.I am wondering if IT just disable sticky function, will that really stop all sethc attack or there are ways that hackers can somehow re-...
0
votes
1answer
115 views

Someone keeps hacking my wifi router [on hold]

I have WiFi router at my home, and I have set the WPA2-PSK security on it. I set it with a strong password. My neighbour has repeatedly hacked my wifi, and I don't know how he breaks my security ...
0
votes
1answer
34 views

How to turn on “only elevate executables that are signed and validated” setting

I'm running Windows 10 Home, and I want to make sure that unsigned executables don't run (or at least I get a popup making sure that I want to run them).I found this page, but I cannot for the life ...
1
vote
1answer
49 views

“Your Connection is not private” - PC can’t go to any HTTPS sites on Chrome and Firefox

At my workplace, one of the computer has problems accessing “https://” websites. It only occurs to this machine and with web browsers Chrome and Firefox; Internet Explorer works with almost no problem ...
0
votes
1answer
46 views

Analyze Spectre and Meltdown Check Script by Red Hat

As you know Red Hat published a script to check the vulnerability of the system to Spectre and Meltdown. Kernel upgrade and activation/deactivation of some features is enough for avoid from these ...
0
votes
0answers
33 views

How to Restrict Windows software to specific directory?

Imagine I have an untrusted software which Do Not Want to access any directory except the one I specify (Restrict software access to an specific directory)Is there a way other than (Virtual machine &...
1
vote
1answer
28 views

How can I effectively restrict myself access to certain websites on Windows 10?

I want to restrict access to myself and I know how to do it using Hosts file but it can be easily disabled by editing this file. Is there a way to effectively restrict myself access to this file after ...
0
votes
1answer
50 views

How does BitTorrent ensure you connect to non-malicious peers when using DHT/Trackerless torrents?

As far as I understand, Trackers in torrents somewhat provide the promise that the peers it shows you are non-malicious.In trackerless torrents however, you fetch peers from other peers. How does ...
2
votes
1answer
54 views

How to get information from an installed malicious program?

I asked a question today on security.stackexchange.com Hijacked certificate and Remote Login. Office computer compromised with a virus? which is a question about a suspicious program named PROGRAM....
123
votes
3answers
19k views

Why does my browser think that https://1.1.1.1 is secure?

When I visit https://1.1.1.1, any web browser I use considers the URL to be secure.This is what Google Chrome shows:Normally, when I try to visit an HTTPS site via its IP address, I get a security ...
0
votes
0answers
10 views

How does a listener channel error like the one mentioned get resolved? [closed]

I have come across a listener channel error related to Exchange and IIS. Since I am new to IT Security concepts, I am unsure as to how to resolve it. Any guidance would be useful.Description:A ...
-1
votes
0answers
26 views

This setting is managed by your domain administrator [migrated]

I'm following Let less secure apps access your account - Google Account Help, specifically "Option 2", however when I click on Less secure apps, I get following message:This setting is managed by ...
1
vote
0answers
16 views

Set variable ftp anon_root directory in ubuntu vsftpd

I have a FTP server running to let local users share files to anon users (friends and peers).The public share folder is called /PubRoot.But I do not want files to be accessed from such a ...
0
votes
1answer
73 views

sudo su not asking password even after changing password

I have an ubuntu instance with aws.After getting ssh login, I was able to change to root password with sudo su command.For security reasons, I wanted to change the root password.So I tries to ...
1
vote
1answer
43 views

Chrome showing insecure for a website. But other browsers show secured

I am trying to open an internet banking website in Chrome.Chrome is showing me that the website is insecure:But if I try using another browser like Safari it shows as secure:I checked with my ...

153050per page