Questions tagged [file-system]

A file system is a way of organizing information on a storage device like a computer hard drive.

A file system is a way of organizing information on a storage device like a computer hard drive.

201 questions
0
votes
0 answers

Secure partitioning: does LVM affect hardening guidelines?

this is the second of a series of questions on hardening Linux servers at the filesystem level. The first is here. The same scenario applies; I copy it here for convenience: At work I'm hardening an Ubuntu 18.04 Server installation following the CIS…
Magasta
  • 1
  • 1
0
votes
0 answers

Secure mount options in Ubuntu CIS benchmarks too narrow?

this is the first of a series of questions on hardening Linux servers at the filesystem level. At work I'm hardening an Ubuntu 18.04 Server following the CIS benchmark 2.0.1. Instead of just running a hardening script, I'm doing it manually in order…
Magasta
  • 1
  • 1
0
votes
1 answer

Windows Encrypted temp directory for files at rest in Windows?

It would be nice if there was an area on my computer where I could work with temp files that may contain sensitive information that could be encrypted with bitlocker or something similar when the files are at rest. It would be even nicer if these…
leeand00
  • 1,297
  • 1
  • 13
  • 21
0
votes
1 answer

How are files in file container (posibly in archive file) encrypted?

I see advantage of using container in it that offer work with more files rather than with one but is there some advantage in encryption technique?I would like to know if it encrypt each single file in a container (or an archive) or is there some…
Many
  • 103
  • 1
0
votes
1 answer

Can file recovery tools recover deleted small files from SSD drive's NTFS Master File Table?

According to this page and site, small files are kept in Master File Table when filesystem is NTFS. Let's assume that computer is using Windows 10 and a SSD drive with TRIM support. If a user manually deletes a file smaller than 1kb from ssd will…
ccccc1cc
  • 11
  • 3
0
votes
4 answers

Generate Fake Encrypted Data

I want to create a file server that will be serving encrypted files without permissions. It would be really awesome if it were impossible for a hacker to tell if a file exists or not, so I am thinking that if every endpoint that does not contain…
0
votes
0 answers

How to protect certain macOS user directory from unauthorized access?

I have several directories on my Mac, two most popular examples are: ~/.aws ~/.ssh They can be read by any script file or third-party app in system. I do not see a way to protect them in macOS (and in Linux). Mechanisms to protect such…
Croll
  • 163
  • 9
0
votes
3 answers

How to protect company sensitive data from being deleted by a user when data is on their computer?

There more than 300 computers and more than 400 users are available. We face two incidents recently when critical users(who has critical data) leave from company.We have deleted their data when they return their laptop or desktop PC. To help protect…
Infra
  • 650
  • 1
  • 6
  • 19
0
votes
2 answers

Privacy concern about file modification on SSDs

We all know that files which are deleted from a modern system usually don't get erased immediately from memory, which is a security risk in itself. However, this question focuses on a different topic: suppose that a file on the system, which is…
John
  • 3
  • 2
0
votes
1 answer

EML file type analysis

I'm working on finding infection points in EML file format. Want to know on what grounds does a scanner declare an email as spam or attachment as malicious? I mean does it scan by MIME content or any other pointer, Is malicious content detectable…
rhym1n
  • 3
  • 5
0
votes
1 answer

Can I detect when a file is copied on Windows?

Can I detect when a file is copied on Windows? Will it create an event in the Windows log? Or can I not? I know you can detect when a file is created due to the file pointers and stuff, but can you detect a file being copied?
Tilak Madichetti
  • 252
  • 1
  • 6
  • 16
0
votes
1 answer

Looking for some sort of system wide auditing tool

The title summarises it all but here's an example: You're sharing some hardware equipment with your dev colleagues, some days everything works well with it, the next day, nothing works anymore, can't even get yum to play nice, etc. And it's not…
fduff
  • 725
  • 1
  • 8
  • 17
0
votes
2 answers

How likely is it to find valuable information in the slack space of a workstation?

I just read about slack space which is the unused space at the end of a sector. This space is unused in some sectors when either the file itself is smaller then the sector or the sector contains the end of a file, which is likely to not fill the…
davidb
  • 4,285
  • 3
  • 19
  • 31
-1
votes
1 answer

How does one find out the file system / directories structure of a webserver they don't own?

How does one with simple access rights find out the remote host directory structure? I see that web archives are able to not only backup content on the specified domain, but every folder within it.
Unihedron
  • 151
  • 1
  • 11
-1
votes
1 answer

Would this be plausible for a metamorphic virus? Not repeatedly infecting same system

Would this be plausible for a metamorphic virus? When a new generation (for lack of better word) is created it would hard code a random file name, that would be checked to see if the system was infected, that the old generation would create.…
Celeritas
  • 10,039
  • 22
  • 77
  • 144
1 2 3
13
14