The protection of computer systems and information from threats such as theft or data destruction.

0
votes
0answers
22 views

will disable the sticky keys prevent sethc hack?

I read about lots of articles about sethc hack and prevention.I am wondering if IT just disable sticky function, will that really stop all sethc attack or there are ways that hackers can somehow re-...
0
votes
1answer
115 views

Someone keeps hacking my wifi router [on hold]

I have WiFi router at my home, and I have set the WPA2-PSK security on it. I set it with a strong password. My neighbour has repeatedly hacked my wifi, and I don't know how he breaks my security ...
0
votes
1answer
34 views

How to turn on “only elevate executables that are signed and validated” setting

I'm running Windows 10 Home, and I want to make sure that unsigned executables don't run (or at least I get a popup making sure that I want to run them).I found this page, but I cannot for the life ...
1
vote
1answer
49 views

“Your Connection is not private” - PC can’t go to any HTTPS sites on Chrome and Firefox

At my workplace, one of the computer has problems accessing “https://” websites. It only occurs to this machine and with web browsers Chrome and Firefox; Internet Explorer works with almost no problem ...
0
votes
1answer
46 views

Analyze Spectre and Meltdown Check Script by Red Hat

As you know Red Hat published a script to check the vulnerability of the system to Spectre and Meltdown. Kernel upgrade and activation/deactivation of some features is enough for avoid from these ...
0
votes
0answers
33 views

How to Restrict Windows software to specific directory?

Imagine I have an untrusted software which Do Not Want to access any directory except the one I specify (Restrict software access to an specific directory)Is there a way other than (Virtual machine &...
1
vote
1answer
28 views

How can I effectively restrict myself access to certain websites on Windows 10?

I want to restrict access to myself and I know how to do it using Hosts file but it can be easily disabled by editing this file. Is there a way to effectively restrict myself access to this file after ...
0
votes
1answer
50 views

How does BitTorrent ensure you connect to non-malicious peers when using DHT/Trackerless torrents?

As far as I understand, Trackers in torrents somewhat provide the promise that the peers it shows you are non-malicious.In trackerless torrents however, you fetch peers from other peers. How does ...