Questions tagged [restrictions]
23 questions
1
vote
1 answer
How can I implement DVD copy protection?
I want to make a DVD movie which will be playable on a standard DVD player, but I want to make it copy restricted.
I know it is practically impossible, but I just want security to protect it from normal users, not from high end software pirates.…
![](../../users/profiles/30099.webp)
Milan V.
- 111
- 2
1
vote
0 answers
Implementing user access restriction Bluetooth LE
I have been working on a system that needs simple access restriction to a bluetooth module. I was going to use a set pin code, but it turns out that Bt LE no longer uses pairing pins. What would be the best way in BT 4.0 to restrict access to…
![](../../users/profiles/128993.webp)
BarrowWight
- 244
- 1
- 7
0
votes
0 answers
Secure Registry Keys
Is it possible to restrict access to the registry keys, just like Microsoft does on some of the keys(ex. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinDefend)?
I was able to get a similar result by setting SYSTEM owner to the key, giving…
![](../../users/profiles/264181.webp)
pepperoni
- 1
- 1
0
votes
0 answers
How to implement internal certification mechanism for my web applications?
Our company develops web applications and uses them on the internal network. We need to set up a mechanism to control and monitor internal network traffic so that only approved applications on the network can be used by clients and not-certified…
![](../../users/profiles/257681.webp)
Saeed MH
- 1
- 1
0
votes
3 answers
Prevent users from copying sensitive data
I got a strange requirement as part of a recent project that our company is involved with. The project involves sensitive information and hence the data is restricted to only the team members involved in the project. We have a network share, and the…
0
votes
1 answer
How to globally limit Bluetooth functionality on Android and iPhone
I recently got my parents a Bluetooth speaker, and they are very new to the smartphone arena. What I would like is to disable all of the Bluetooth functionality in their phones except for the ability to play music and place calls through the…
![](../../users/profiles/135814.webp)
Rusty Lemur
- 101
- 2
0
votes
1 answer
How is it possible to bypass single-site restriction set by ISP?
What's going on in this video?
https://www.youtube.com/watch?v=lXVqdezJf1A
Here, the ISP restricts access to all other sites but one (twitter.com) when the user's account balance is insufficient. In this video, an SSH connection is being used…
![](../../users/profiles/96479.webp)
chaosifier
- 133
- 1
- 1
- 5
-1
votes
1 answer
How do VPN providers exactly encrypt traffic from client to their server?
I'm thinking to build a VPN for personal use on a VPS but am unable to understand one thing. How exactly VPN providers encrypt data from client to their server? Suppose if I simply configure IP of my VPS and port in my browser it would be simple…
![](../../users/profiles/222544.webp)
rosh
- 1