Questions tagged [protection]
177 questions
106
votes
10 answers
Prevention measures against laptop seizure at US borders
Since laptop and other electronic device seizures at US borders became legal without a warrant (including making copies of data), 7% of ACTE's business travelers reported being subject to a seizure as far back as February 2008.
What measures have IT…
Dan Dascalescu
- 1,945
- 2
- 15
- 23
85
votes
6 answers
How do large companies protect their source code?
I recently read the canonical answer of our ursine overlord to the question on How do certification authorities store their private root keys?
I then just had to ask myself:
How do large companies (e.g. Microsoft, Apple, ...) protect their valuable…
SEJPM
- 9,500
- 5
- 35
- 66
50
votes
10 answers
Can a steel woven wallet prevent RFID scanning of credit card information?
According to the Popular Mechanics article RFID Credit Cards and Theft: Tech Clinic, the fact that many new credit/debit cards have a RFID chip embedded on it, there is a risk (albeit, small according to the article) that the card would be 'skimmed'…
user31551
41
votes
7 answers
Somebody hacked my router and changed my wifi SSID
One of my neighbours hacked the password of my router and he uses my limited internet package. I change the wifi SSID almost daily, but he can hack it easily.
Today, he changed the SSID to a hate speech "insult".
How can I stop him? I need a quick…
user2824371
- 539
- 1
- 4
- 7
40
votes
4 answers
How to protect printers from being hacked
Recently it got to my attention that someone has hacked around 50,000 printers and used them to print the message they wanted to. (link)
As someone who doesn't have a lot of knowledge about networks or hacking, what would be the steps to take to…
aMJay
- 3,615
- 5
- 11
- 20
40
votes
2 answers
What is protection ring -1?
Due to the Lenovo firmware ThinkPwn bug I'm trying to understand privileges and rings.
If the kernel is Ring 0 and SMM (System Management Mode) is Ring -2, what could be in between that is Ring -1?
Thomas Weller
- 3,246
- 3
- 21
- 39
32
votes
2 answers
How trustworthy is `sudo apt-get install (package name)` in Ubuntu?
One of the easy ways to install a program in Ubuntu Linux is to type a command in the terminal, but how do I know that the program is coming from a trusted source and not from somewhere dangerous? For example, if I was installing ClamAV, how do I…
Henry WH Hack v3.0
- 2,109
- 2
- 23
- 37
28
votes
2 answers
Is it possible for my password to have more than one password combination?
Can my password have more than one password combination?
I read up on physical combination locks (the lock you open with numbers) and I learned that a combination lock can have more than one possible combinations.
Also I had my first phone, a…
Henry WH Hack v3.0
- 2,109
- 2
- 23
- 37
24
votes
8 answers
Is there a way to make a WEP-secured AP uncrackable?
For some days, I was feeling that my Internet bill was booming. Then, I recently found out that a boy near my house was accessing my router to use the Internet. Then, I read some articles how to crack WEP security and found that it is way too easy…
Snake Eyes
- 491
- 4
- 11
22
votes
8 answers
Protect API from being tampered?
I'm building an API with websocket that serializes data through JSON. The App itself is a chat application. I came up with the following structure to send my data:
{date: '2020-05-31', time: '14:28:05', text: "Hey!", to: '', from:…
VladiC4T
- 379
- 4
- 8
22
votes
6 answers
Would removing spaces in a string protect against SQL injection?
I was curious if it's possible to protect against an SQL injection attack by removing all spaces from an String input?
I have been reading up on SQL Injection at OWASP, but they don't mention anything about removing spaces, so I was curious why it…
XaolingBao
- 897
- 2
- 9
- 21
21
votes
4 answers
Could my bank's two-factor authentication be hacked?
When I attempt to log in to my bank, an SMS code is sent to my phone. I then type this nine-character code into the bank's Web site, to login to my account.
Is this vulnerable to attack, without hacking the bank's software or server, or without…
user13779
21
votes
4 answers
Keylogger web application protection
I'm trying to improve security in a web application. The application has an admin site and keyloggers are a concern that I'm trying to solve. Can the application do something that can prevent keyloggers from working correctly? I've read about…
Schockey
- 221
- 2
- 5
20
votes
4 answers
Protecting Health Care Database
I am doing a minor project on information security in which i am implementing techniques listed below to protect a HEALTH CARE database.
Preventing SQL Injection (using prepared statements,validating,using a tokenization algorithm)
Preventing CSRF…
Shubham Gupta
- 301
- 1
- 5
17
votes
1 answer
How to protect from caller-id spoofing?
Yesterday, I listened about caller-id spoofing and was left astonished as its misuse can result in severe consequences for victim.
Please tell me how to protect myself from this prank and is there anyway to recognize that it is a fake call?
Divyanshu
- 305
- 3
- 13