Questions tagged [file-system]

A file system is a way of organizing information on a storage device like a computer hard drive.

A file system is a way of organizing information on a storage device like a computer hard drive.

201 questions
5
votes
2 answers

Raw hard disk data extraction possible?

Suppose that the administrator's account is hacked. Then, can a hacker extract hard disk raw data (by raw data, I mean every raw data, not just files that can be read by a file system.)?
David Bowie
  • 51
  • 1
  • 2
5
votes
3 answers

How to check for null byte injection in Java webapp

Looks like Null Byte Injection is possible in Java apps. see: Is null-byte injection possible in Java filenames? So how does one protect against it? Inspect all the bytes of the filename for a 0 (zero) byte?
ron
  • 53
  • 1
  • 3
4
votes
2 answers

Possible to detect an/or shut off CryptoLocker by limiting total network bytes transferred?

Since a virus infected PC has to download (encrypt) reupload the entire file (to a file server), and repeat the process for every network drive, is is possible to detect this unusually high bandwidth event? Is there a way to respond to it (via QOS…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
4
votes
1 answer

Are files created in Chrome OS developer mode tracked by Google?

If I enable developer mode, then open a shell and create /some/directory/temp.txt, it is invisible to me through the Chrome Filesystem API. But does this mean that it's also invisible to Chrome OS itself? This is a follow-up to this question.
Alex Shroyer
  • 233
  • 3
  • 8
4
votes
1 answer

External hard drives: 'date last accessed' file?

I'm trying to figure out if there's a way to figure out when files on my external hard drive were last opened. I'm using a Seagate Backup Plus, and it's both mac and PC compatible. BUT, I've also read that updating of the 'accessed' date is usually…
HelenCC
  • 41
  • 1
  • 3
4
votes
3 answers

Are file permissions set in Unix/Linux effective in Windows or Any other OS?

Consider some files and folder in Unix/Linux OS which are configured for only read access by root, if the hard drive stolen, and used in Windows Environment, are these permissions are still effective? Same scenario: setting file and folder…
Akam
  • 1,327
  • 3
  • 14
  • 23
4
votes
1 answer

openssl vs gpg for file based encryption? Pros vs cons for security?

I want to encrypt a tar archive and optionally a block file system (akin to DMG image). Does anyone know the pros vs cons of encrypting each with OpenSSL vs GPG? I ask because some have stated that the OpenSSL command line is malleable and prone to…
Nick
  • 247
  • 2
  • 5
4
votes
3 answers

Why should the user ID and group ID of every file match an existing user?

I've been reading in most hardening guides for Linux, that you should check for files and directories without valid user or valid group. What I can't find, is how this could be used for an attack, or how this could be a weakness, besides it being…
user857990
  • 903
  • 1
  • 9
  • 21
4
votes
3 answers

How do polymorphic/metamorphic/self-encrypting/self-changing file infectors know if they have infected a file or not?

If a virus rewrites itself for each infection how would it know if it has infected a file or not? If it keeps infecting the same file soon the whole file structure will be corrupt. For example how does Simile or Sality know if it has infected a file…
Celeritas
  • 10,039
  • 22
  • 77
  • 144
4
votes
2 answers

Security vulnerabilities when sharing files between virtual machine and host

According to this link, when running a windows OS virtual machine on a windows host OS, one can share files like one would share files between two computers on a network by ensuring that file sharing is enabled on both operating systems. My mom her…
4
votes
1 answer

Web application reacts differently to Windows reserved names like CON, AUX, NUL

Several web applications I tested have the behavior that reserved Windows filenames such as AUX, CON, NUL, PRN, COM1, LPT1 have different behavior than other pages. For example, http://example.com/foo will give a 404, where http://example.com/aux…
Sjoerd
  • 28,707
  • 12
  • 74
  • 102
4
votes
1 answer

EncFS vs EFS advantages for Dropbox-seamless encryption

I am considering a solution for securing my private data in Dropbox. In spite of OneDrive, MEGA and AmazonCloud are also being considered but now I put my focus on Dropbox as the most feature-rich of all. I came to the couple of options that are…
4
votes
5 answers

How do I run an unknown .exe file without being in risk

I would like to know whether there is any way I can run an absolutely unknown executable file without being hacked even if the file contains a lot of malicious code. Is there any program in which I can run it without putting myself in any risk?
Tomas
  • 1,331
  • 3
  • 10
  • 10
4
votes
5 answers

Is running an erase tool after an OS install sufficient to ensure no data from the old install is recoverable?

How secure do you consider this process? A drive has data from a previous OS installation. A new OS installation is made on the drive, and Heidi Eraser is run on free space. What are the chances of data being recovered from the original install?
JohnCharles117
3
votes
1 answer

Unauthorized file writes on Linux

Suppose my web browser or any other web-connected app has a minor security hole that won't allow an attacker to run code but will allow them to write a piece of text into a text file I own. On a typical Linux distro however, certain text files, such…
PSkocik
  • 270
  • 1
  • 8