Questions tagged [recovery]
64 questions
0
votes
1 answer
How to prevent the recovery of deleted files without a full format of external HDD?
How can I securely delete selected files so they can’t be recovered, but without the full format of the external HDD? Is this even possible?
I’m using Mac OS.
![](../../users/profiles/282039.webp)
account name
- 1
- 1
0
votes
0 answers
Windows 10 Cybersecurity on Stand-Alone Computer
I have been asked to investigate what capabilities exist within Windows 10 where the environment for this system is isolated. I believe it would not be able to benefit from an enterprise security management and cloud data management (supporting…
![](../../users/profiles/7193.webp)
Jim
- 255
- 1
- 10
0
votes
1 answer
If I move a file within the same drive or partition and then shred that file with a file shredder, would it still be recoverable?
If I move a file within the same drive or partition, suppose from one folder to another, and then shred that file with a file shredder, would it still be recoverable? Is there still some trace of that file left in the previous location it was…
![](../../users/profiles/264639.webp)
Musa
- 1
- 1
0
votes
1 answer
Should I save my 2FA setup keys instead of recovery keys?
In case we lose access to our 2 Factor Authenticator, we can use our one time recovery codes to regain access to our accounts
But what if we store the setup key itself instead of the recovery codes? We can still recover the account by adding the…
![](../../users/profiles/264243.webp)
Balu
- 1
0
votes
1 answer
Is an owned domain + self hosted email the closest to owning one's online identity? Are there better alternatives?
Most online accounts identify users using email/phone & password; but since most all email/phone is handled by another service (e.g. Gmail), one's online identity only exists so long as these services permit it; in a sense, the service owns the…
![](../../users/profiles/261890.webp)
user8187
- 141
- 1
- 6
0
votes
2 answers
Are Bitcoin Scam Recovery business a scam?
I have an acquaintance that has lost USD 10k - 20k in a Cryptocurrency Investment scam. I strongly suspect he is about to get involved in what in my mind would be a "Crypto Currency Scam Recovery Scam" - which I posit to be a thing.
Although…
![](../../users/profiles/21993.webp)
davidgo
- 593
- 5
- 11
0
votes
0 answers
Recovery files fails Raspberry Pi 3b
i am trying to learn something about computer security, I decided to start from the linux world, through raspberry p3 with raspbian jessie OS
I would like to start with forensics file management, and I did a test on data recovery
I took an empty FAT…
![](../../users/profiles/173006.webp)
onec0de
- 121
- 4
0
votes
0 answers
How to allow account recovery when a user loses everything?
Preface
We are currently creating a new system for our clients and are stuck on account recovery when a user loses access to everything.
The system is entirely controlled by our company in the following way:
Our employee creates a client company…
![](../../users/profiles/177044.webp)
ctwheels
- 101
- 2
0
votes
1 answer
How to decrypt password manager vault without the password manager client?
I've started looking into password managers these days and have come to trust the general concept. They provide convenience and very good general security if used right.
However there is one point of concern that remains:
What happens if my…
![](../../users/profiles/232023.webp)
Simon Massa
- 1
- 1
0
votes
1 answer
Recover corrupted password protected Zip
Good evening.
I have a password protected zip archive (Zip 2.0 CryptoZip) with a .txt file with sensitive info inside. The problem is that I can't extract it.
7Zip:"Data error : Wrong password?"
WinRar:"CRC failed in the encrypted file. Corrupt…
![](../../users/profiles/219656.webp)
AndreaScotti
- 1
- 1
0
votes
1 answer
double-new attack? replace contact method twice so that the "new" and "old" one are both attacker-controlled
With some services, if an attacker changes the value of a user's contact information (email address, for example), when the user tries to recover their account, they can use either the new or the old value for contact information to do the account…
![](../../users/profiles/177952.webp)
Bennett
- 653
- 3
- 9
0
votes
0 answers
Is it a good idea to test an Apple Recovery Key for your Apple computer?
Out of the blue my Apple computer would not accept either the password or the recovery key. I ended up having to erase and restore via a backup - great to have backups! But I was very surprised the recovery key didn't work (It was correct). My…
![](../../users/profiles/185463.webp)
KresWon895
- 31
- 2
0
votes
1 answer
Recovering data on unallocated space from FAT16 USB drive
I'm actually trying to make my hand around forensic and information security as a whole. To do this, I'm trying to make a lot of CTFs. The last one I got to do is puzzling me, 1st because I have no experience with this and second, because I don't…
![](../../users/profiles/207193.webp)
Pete
- 1
- 1
0
votes
1 answer
Whats a good backup policy for application with 0 hours RPO?
In my company, we have business critical applications with 0-hour RTO (Recovery Time Objective) and RPO (Recovery Point Objective) requirement. Usual strategy to ensure the RPO objective is to have regular backups (let’s say daily incremental,…
![](../../users/profiles/204123.webp)
Abhoras
- 1
0
votes
2 answers
Account Recovery: Displaying username without verification
I'm not a security guy, so bear with me. As discussed in other topics, usernames in and of themselves are valid forms of verification, and there's nothing particularly sensitive or secure about usernames. For example, in most registration flows,…
![](../../users/profiles/202301.webp)
Casey Robinson
- 101
- 1