Tag: security

668 How are pseudorandom and truly random numbers different and why does it matter? 2014-02-05T03:26:25.377

363 How can I give my wife emergency access to logins, passwords, etc.? 2012-12-04T12:30:02.717

315 How to fix warning about ECDSA host key 2012-05-05T19:05:56.153

302 How to mess up a PC running Windows 7? 2011-04-27T06:25:49.287

276 How do I list the SSL/TLS cipher suites a particular website offers? 2010-02-15T18:47:18.380

244 How to reliably keep an SSH tunnel open? 2009-09-08T13:04:22.457

189 "This file came from another computer..." - how can I unblock all the files in a folder without having to unblock them individually? 2009-09-09T15:23:43.127

159 Is it really possible for most enthusiasts to crack people's Wi-Fi networks? 2014-03-24T22:56:12.970

149 How to wipe free disk space in Linux? 2009-08-06T23:48:03.757

144 How does Linux know that the new password is similar to the previous one? 2014-12-27T17:22:21.883

139 How to password protect gzip files on the command line? 2010-07-12T12:50:47.870

134 Why does my browser think that https://1.1.1.1 is secure? 2018-04-12T04:05:16.987

132 What is the danger of inserting and browsing an untrusted USB drive? 2014-01-30T18:44:56.050

128 How to identify whether my Linux computer was hacked? 2011-04-20T18:24:50.473

127 How do I view the contents of a PFX file on Windows? 2013-04-10T04:59:30.763

119 How to use the Internet while Heartbleed is being fixed? 2014-04-09T04:55:49.370

109 Deceptive site ahead: unanalytics.com 2018-05-08T11:11:06.930

107 Securely erasing all data from a hard drive 2009-07-16T05:59:28.753

103 How can I make a Windows PC bullet-proof for home users? 2009-07-28T13:56:01.340

100 "Google Software Update would like to control this computer..." What? 2013-10-10T12:48:09.517

99 What is 1e100.net and why do I have TCP ports open to it? 2009-11-27T08:46:25.203

95 Is "HTTPS Everywhere" still relevant? 2019-10-27T02:06:25.153

89 My colleague often shuts down my machine through the LAN - how do I prevent it? 2014-02-15T07:06:53.153

85 Which TrueCrypt Algorithm is the safest? 2010-11-06T11:41:12.430

84 SSH: The authenticity of host <host> can't be established 2012-05-05T23:39:28.177

83 Chrome 68 "Not secure" How to make it in red color? 2018-07-25T05:30:07.537

82 How to destroy a CD/DVD rom safely? 2013-10-15T14:36:23.380

81 Give write permissions to multiple users on a folder in Ubuntu 2011-05-09T08:44:23.717

81 Why do some websites show the company name next to the URL? 2013-03-13T18:04:23.927

79 What makes Secure Login (CTRL+ALT+DEL) Secure? 2015-04-15T13:32:25.443

75 How to remove security from a PDF file? 2010-08-22T16:52:21.013

73 scp to remote server with sudo 2010-05-07T21:42:14.097

73 How do I extract fingerprints from .ssh/known_hosts? 2013-01-07T02:52:05.930

72 Do I need to have a passphrase for my SSH RSA key? 2011-03-23T14:50:30.923

71 How is Linux not prone to viruses, malware and those kinds of things? 2010-10-03T15:38:56.077

71 How to store SSH keys? 2011-08-16T19:36:23.600

68 How to run a cron job as a specific user? 2010-08-02T11:50:25.917

67 What is the default username and password for SonarQube? 2013-08-27T19:22:40.587

65 Display list of computers on a LAN in Linux 2011-07-15T17:51:44.963

62 Permission to make symbolic links in Windows 7? 2010-02-04T19:28:19.483

60 What is better for GPG keys - RSA or DSA? 2009-07-26T13:39:44.760

60 Is there a point in installing antivirus on Ubuntu? 2012-09-12T07:24:34.003

60 The MD5 hash value is different from Bash and PHP 2016-02-21T16:42:03.033

58 Finding out which app is using the webcam 2011-09-13T16:58:43.330

58 Why does Google call Thunderbird "less secure"? 2014-12-22T16:47:03.450

55 What do you do if you are being hacked by something coming from a supposedly legitimate IP address such as from Google? 2015-03-22T01:11:20.957

54 How do anti-viruses work? 2009-10-20T09:42:25.113

52 Is my host machine completely isolated from a virus-infected virtual machine? 2011-05-26T18:13:23.707

51 Short, easy to understand explanation of GPG/PGP for nontechnical people? 2009-07-31T03:28:56.780

51 What are the potential security issues when I keep using Windows XP? 2014-04-08T15:19:25.923

49 How safe is Firefox password manager? 2009-08-09T07:50:58.530

49 How secure is the Windows clipboard? 2015-07-06T04:29:39.467

49 How to mitigate any privacy-related risks associated with taking your laptop for repair? 2017-11-19T22:49:28.397

47 How can I get a virus by just visiting a website? 2011-06-27T18:01:56.480

47 Destroy a hard drive without proper equipment 2011-10-05T11:46:05.247

47 Best encryption and signing algorithm for GnuPG: RSA/RSA or DSA/Elgamal? 2013-01-24T13:33:03.600

46 Why is SSH key authentication better than password authentication? 2011-06-28T12:49:08.137

46 Should I install Internet Explorer updates although I disabled it? 2014-05-02T18:44:46.550

43 How secure are password-protected zip files? 2010-04-10T12:01:49.467

42 Can I permanently prevent Java security updates from installing Yahoo Toolbar? 2009-03-10T08:53:04.760

41 Would Microsoft Security Essentials be adequate protection? 2009-09-29T15:40:48.997

41 Security Concern with my Windows 7 Box at Work 2011-07-15T20:33:49.987

40 Simple built-in way to encrypt and decrypt a file on a Mac via command-line? 2011-12-21T20:57:39.737

40 How to find source process of unknown popup in Windows 7 2015-02-23T20:51:47.673

39 How can clients easily and securely send me passwords? 2009-08-11T19:47:39.700

39 Disable Windows 7's "Open File - Security Warning" dialog for exe on network drive? 2009-11-13T03:07:16.550

39 Which of the Windows updates are really necessary? 2011-10-24T11:00:21.360

39 What is the value of MD5 checksums if the MD5 hash itself could potentially also have been manipulated? 2014-12-08T07:24:24.453

39 Safely adding insecure devices to my home network 2016-11-03T13:26:19.980

37 Why is it bad to have open ports? 2009-12-13T00:12:33.927

37 If a password is compromised, is a "similar" password also compromised? 2011-06-20T01:11:38.097

37 Automatically login and lock 2011-11-01T02:43:37.240

37 How to disable "Download scanning protection" of new Chrome-17? 2012-02-09T00:43:18.530

37 Can admins monitor my activity locally even when I use a VPN? 2012-09-09T22:28:41.293

36 Is it a bad idea to use the same private ssh key on multiple computers? 2009-08-05T00:32:37.790

36 Windows 7 never remembers my password credential 2011-03-28T22:12:52.277

35 Password Cracking Windows Accounts 2008-10-01T12:54:16.317

35 How to block all traffic but one IP in Windows Firewall? 2011-04-10T02:09:06.800

35 How come one user can delete another user's 755 files? 2014-11-02T13:07:46.627

34 Access denied even though I'm an Administrator? 2010-05-11T07:50:47.800

34 Is using multiple passes for wiping a disk really necessary? 2010-11-28T11:56:45.143

34 Can Google Employees See My Passwords Saved in Google Chrome? 2013-10-07T00:53:57.323

33 Can other people on an encrypted Wi-Fi AP see what you're doing? 2010-06-25T19:30:30.233

33 How do I remove a usage restriction from a PDF file? 2013-07-08T08:37:08.030

33 I'm using Chrome and Chrome Sync; does Google have access to my passwords? 2014-05-14T16:31:27.897

33 Can a file be maliciously changed in a way that maintains its original SHA-1 Hash? 2015-03-15T22:21:16.377

32 What makes LastPass so secure? 2010-01-02T18:15:17.357

32 Why does Nvidia create UpdatusUser account and is this a security issue? 2011-08-06T13:25:37.657

32 How do I disable administrator prompt in Windows 8? 2012-08-22T09:10:52.650

32 Malicious "confirm navigation" dialogs? 2013-08-31T09:07:22.393

31 Is there a keystroke that can lock the Mac OS X screensaver? 2009-07-23T16:28:39.943

31 How to put fear of God (law) into Wi-Fi hacking neighbors 2012-03-28T12:34:49.733

31 Why is the Internet said to be an untrusted network? 2012-07-11T08:10:22.040

31 How much can we rely on filesystem permissions for security? 2015-09-27T03:38:26.390

30 Does Microsoft Security Essentials replace Windows Defender? 2009-10-02T03:04:56.243

30 Can someone explain the 'PasswordAuthentication' in the /etc/ssh/sshd_config file? 2010-07-09T05:44:34.130

30 Determining if a hard disk has been removed and data copied from it? 2011-07-18T07:02:16.733

30 Is "curl -u username:password http://example.com" secure? 2015-05-26T20:01:50.347

29 How to prepare your PC or laptop for theft 2009-08-03T17:25:41.187