Questions tagged [file-system]

A file system is a way of organizing information on a storage device like a computer hard drive.

A file system is a way of organizing information on a storage device like a computer hard drive.

201 questions
3
votes
5 answers

Security purpose of asking admin password to mount partition on Linux

So I divided my 250GB laptop drive into 2 partitions and some swap. On the second partition which is an ext4 60GB partition I installed Fedora 17. On the other bigger NTFS partition I've got Win XP and files I use when running both operating…
Happy
  • 79
  • 2
  • 7
3
votes
2 answers

Can a website see the file location of a document I upload?

While applying to a job, I uploaded a resume to a recruiting website: C:\myname\an\embarrassing\path\to\my\resume.pdf Can the website see the file path of my uploaded document?
rvictordelta
  • 145
  • 1
  • 1
  • 5
3
votes
1 answer

Is the mount manpage saying nosuid *is* secure, or is *not*?

I'm a bit confused about the description of nosuid in the mount manpage on this RedHat system I'm setting up: nosuid Do not allow set-user-identifier or set-group-identifier bits to take effect. (This seems safe, but is in fact rather…
kojiro
  • 579
  • 4
  • 11
3
votes
1 answer

Weird group name ( 1002)

Please forgive me if this is the wrong place to ask this, but I ran ls -l on an ubuntu machine today in /etc and found a few entries like the following middle entry which appears to have spaces in front of the GID. -rw-r--r-- 1 root root 92 Apr…
uofc
  • 135
  • 7
3
votes
1 answer

How does Android prevent me from installing custom system services?

I am trying to understand the secure boot process. Lets say the firmware is locked and only does signed installation of an OS image. This "image" is a compressed bundle of all the binaries needed by the system. So once these are installed they are…
user220201
  • 893
  • 9
  • 22
3
votes
1 answer

Is it safe to call mount(2) and pass the password as a parameter?

I wanted to write a daemon that users can start, and that, every 2 hours, automatically mounts an authenticated network share. The daemon will prompt the user for the password only the first time, and it will keep it mlock()ed then. My idea was to…
Johannes
  • 165
  • 3
3
votes
2 answers

Uncover data in file slack

Today in class we learned about how information can be uncovered in a file slack. I understand this theoretically, given the physical and logical file size I can come up with the slack space of a file. However, how can I uncover this information in…
Bthegreatest
  • 31
  • 1
  • 1
  • 3
3
votes
1 answer

VeraCrypt: create encrypted container: Volume Format: Options: Filesystem: None?

I see VeraCrypt has an option to create an encrypted container with no filesystem. How is this possible? If there is not filesystem there, then how can I place my files or folders in the container? Is this an option for those wanting to place a…
Jordan Jamingsons
  • 173
  • 1
  • 2
  • 8
2
votes
1 answer

Antivirus monitoring activity: why do they not have an internal firewall to prevent processes' access to user's documents?

A question that arises after an updated and licensed version of Norton Internet Security has detected a trojan installed in my new laptop (Windows 7 installed on 26 Aug'15 and fully updated). Trojan location: specifically at C:\Program Files…
rellampec
  • 135
  • 6
2
votes
2 answers

Can you access Google Drive documents if you have the absolute path to the file?

I have been digging into Google Drive while I am trying to investigate a proper way to protect files on a site. In my experience if a user has the URL to a file they can access it without any protection, like Facebook images for example. However,…
aresne lupin
  • 121
  • 4
2
votes
1 answer

Difference in size avaialbe in encrypted volume

I was making a volume with trucrypt and I set the size to be 12MB. I tried copying 10 files totalling 7.13MB (on Disk) but got an error saying I did not have enough space. Why is this? Is it because I'm copying from an NTFS format to FAT?
Celeritas
  • 10,039
  • 22
  • 77
  • 144
2
votes
2 answers

exploiting setuid and setgid bit

I was reading material on secure coding and at many places it is mentioned not to use setuid and setgid bits for privilege escalation. These a vulnerable and can lead to security issues. Instead we should run a dedicated helper process which can do…
user775093
  • 315
  • 1
  • 7
2
votes
1 answer

Where to store uploaded images from perspective of security

It is quite common that uploaded files (images, videos, etc.) are stored on a file server because of performance and database-recovery-time reasons. But is there a benefit of storing such files in database in terms of security?
My-Name-Is
  • 389
  • 1
  • 5
  • 12
2
votes
3 answers

Wipe free space or take image and wipe entire disk?

Read some of the stuff here regarding wiping disks and securely deleting files. From what I've understood, after deleting (not securely) files they become part of the unallocated(free) space of the HDD. So if I want to securely delete the deleted…
user45011
  • 21
  • 2
2
votes
2 answers

best practice for encrypted filesystem inside a file

This is an extension of my question on UNIX. Let's suppose I create a file, map it to /dev/loop0, and create a LUKS partition inside dd if=/dev/zero of=myfile bs=1M count=1000 losetup /dev/loop0 myfile cryptsetup -c aes-cbc-essiv:sha256 -s 256 -v…
Martin Vegter
  • 1,826
  • 4
  • 27
  • 39