Questions tagged [recovery]

64 questions
0
votes
1 answer

How to prevent the recovery of deleted files without a full format of external HDD?

How can I securely delete selected files so they can’t be recovered, but without the full format of the external HDD? Is this even possible? I’m using Mac OS.
0
votes
0 answers

Windows 10 Cybersecurity on Stand-Alone Computer

I have been asked to investigate what capabilities exist within Windows 10 where the environment for this system is isolated. I believe it would not be able to benefit from an enterprise security management and cloud data management (supporting…
Jim
  • 255
  • 1
  • 10
0
votes
1 answer

If I move a file within the same drive or partition and then shred that file with a file shredder, would it still be recoverable?

If I move a file within the same drive or partition, suppose from one folder to another, and then shred that file with a file shredder, would it still be recoverable? Is there still some trace of that file left in the previous location it was…
Musa
  • 1
  • 1
0
votes
1 answer

Should I save my 2FA setup keys instead of recovery keys?

In case we lose access to our 2 Factor Authenticator, we can use our one time recovery codes to regain access to our accounts But what if we store the setup key itself instead of the recovery codes? We can still recover the account by adding the…
0
votes
1 answer

Is an owned domain + self hosted email the closest to owning one's online identity? Are there better alternatives?

Most online accounts identify users using email/phone & password; but since most all email/phone is handled by another service (e.g. Gmail), one's online identity only exists so long as these services permit it; in a sense, the service owns the…
user8187
  • 141
  • 1
  • 6
0
votes
2 answers

Are Bitcoin Scam Recovery business a scam?

I have an acquaintance that has lost USD 10k - 20k in a Cryptocurrency Investment scam. I strongly suspect he is about to get involved in what in my mind would be a "Crypto Currency Scam Recovery Scam" - which I posit to be a thing. Although…
davidgo
  • 593
  • 5
  • 11
0
votes
0 answers

Recovery files fails Raspberry Pi 3b

i am trying to learn something about computer security, I decided to start from the linux world, through raspberry p3 with raspbian jessie OS I would like to start with forensics file management, and I did a test on data recovery I took an empty FAT…
onec0de
  • 121
  • 4
0
votes
0 answers

How to allow account recovery when a user loses everything?

Preface We are currently creating a new system for our clients and are stuck on account recovery when a user loses access to everything. The system is entirely controlled by our company in the following way: Our employee creates a client company…
ctwheels
  • 101
  • 2
0
votes
1 answer

How to decrypt password manager vault without the password manager client?

I've started looking into password managers these days and have come to trust the general concept. They provide convenience and very good general security if used right. However there is one point of concern that remains: What happens if my…
0
votes
1 answer

Recover corrupted password protected Zip

Good evening. I have a password protected zip archive (Zip 2.0 CryptoZip) with a .txt file with sensitive info inside. The problem is that I can't extract it. 7Zip:"Data error : Wrong password?" WinRar:"CRC failed in the encrypted file. Corrupt…
0
votes
1 answer

double-new attack? replace contact method twice so that the "new" and "old" one are both attacker-controlled

With some services, if an attacker changes the value of a user's contact information (email address, for example), when the user tries to recover their account, they can use either the new or the old value for contact information to do the account…
Bennett
  • 653
  • 3
  • 9
0
votes
0 answers

Is it a good idea to test an Apple Recovery Key for your Apple computer?

Out of the blue my Apple computer would not accept either the password or the recovery key. I ended up having to erase and restore via a backup - great to have backups! But I was very surprised the recovery key didn't work (It was correct). My…
KresWon895
  • 31
  • 2
0
votes
1 answer

Recovering data on unallocated space from FAT16 USB drive

I'm actually trying to make my hand around forensic and information security as a whole. To do this, I'm trying to make a lot of CTFs. The last one I got to do is puzzling me, 1st because I have no experience with this and second, because I don't…
Pete
  • 1
  • 1
0
votes
1 answer

Whats a good backup policy for application with 0 hours RPO?

In my company, we have business critical applications with 0-hour RTO (Recovery Time Objective) and RPO (Recovery Point Objective) requirement. Usual strategy to ensure the RPO objective is to have regular backups (let’s say daily incremental,…
0
votes
2 answers

Account Recovery: Displaying username without verification

I'm not a security guy, so bear with me. As discussed in other topics, usernames in and of themselves are valid forms of verification, and there's nothing particularly sensitive or secure about usernames. For example, in most registration flows,…