Tag: security

2 Is a long easy-to-remember passphrase, made out of dictionary words, really secure? 2014-07-28T12:25:53.123

2 Can I stop a format disc operation midway? 2014-07-30T16:27:18.567

2 Sign in with mongo shell without having my password shown? 2014-07-31T17:43:22.567

2 Secure ffmpeg streaming connection? 2014-08-10T03:35:11.277

2 IP address discovered 2014-08-13T12:36:32.747

2 Why does Microsoft Word open Word 6.0 Binary Documents and Templates in Protected View by default? Is there a reason I shouldn't turn that off? 2014-08-15T01:39:42.193

2 How to protect (prank from) an unlocked computer 2014-08-16T13:31:01.190

2 Why is someone else's PC listed in "Network"? 2014-08-18T06:40:06.270

2 Is UEFI more or less vulnerable than Legacy BIOS? 2014-08-22T11:54:36.473

2 Do I have to export public GnuPG keys as well when exporting the private ones? 2014-08-23T01:22:08.243

2 Separation of work, personal, and private , for all things tech? 2014-09-24T03:05:54.060

2 Why cant operating system decide which program to use when opening files without their suffix? 2014-09-30T13:58:08.927

2 How do I wipe a USB drive using dd on cygwin on Windows? 2014-10-06T21:09:58.730

2 How to secure a compromised virtual machine 2014-10-10T18:34:31.557

2 Block site if browser not in incognito - Chrome 2014-10-12T13:49:47.357

2 How do I configure my system to trust a CA for a specific subset of domains? 2014-10-16T15:31:15.423

2 Is it safe to run WindowsXP as a Virtual Machine? 2014-10-21T08:39:47.683

2 Why is allowing root login via FTP( on cPanel) a considerable security risk? 2014-10-29T02:31:10.283

2 Unable to read an email protected by Rights Management Service 2014-11-03T08:29:37.310

2 TeamViewer wants a password for the Options dialog 2014-11-04T08:05:49.777

2 Very high CPU usage on Linux server 2014-11-16T12:57:37.517

2 Does keeping Windows 7 updated make anti-virus software useless? 2014-12-01T18:58:28.620

2 About adding many sites with only different ports to Java Exception Site List 2014-12-02T11:28:54.487

2 Pairing of logitec Unifying devices uses a "secret algorithm"? 2014-12-04T22:41:45.087

2 If I open a document from a USB flash drive but do not save it to the computer, can someone access the file’s contents after I remove the drive? 2014-12-06T01:42:29.367

2 Hidden network seems off and how can I increase my network security 2014-12-22T13:40:34.180

2 What is the theory behind securely delete files on a SSD? 2014-12-24T14:32:17.293

2 Can YouTube safety mode be configured to survive a browser history clear? 2014-12-27T20:24:59.677

2 bash Segfault by infinite recursion 2015-02-19T11:47:33.540

2 "Windows Security" alert when moving files in My Documents/Desktop (local disk) 2015-02-19T14:09:56.960

2 How can using a Tor Hidden service for SSH improve security? 2015-02-21T11:21:14.863

2 Send packet (frame) with different 'Sender's MAC'? 2015-03-03T04:44:15.627

2 How to encrypt Google Drive on local machine 2015-03-07T08:52:16.347

2 Prevent computer from connecting to outside LAN networks 2015-03-09T17:00:48.083

2 How do you unprotect the VBA macros for a macro-enabled workbook if you forgot the password? 2015-03-13T09:28:24.350

2 Are many sshd/root processes listed by ps, brute force SSH hack attempt? 2015-03-16T18:28:20.340

2 What causes CTRL-ALT-DELETE to be enabled on a non-domain-joined system? 2015-04-13T17:23:37.357

2 Linux bootup only with USB dongle 2015-04-17T09:54:30.497

2 Eset Smart security finds my hosts file as threat and quarantines it 2015-04-22T23:21:19.087

2 Securely delete a file in Ubuntu? 2015-04-25T15:32:04.567

2 What makes Kali Linux different from other Linux distros for it to be used exclusively for hacking and penetration testing? 2015-04-26T18:49:00.913

2 Taken to random websites when clicking on links 2015-04-28T13:54:50.290

2 Is there a way to bypass HSTS protocol? 2015-05-09T15:55:16.760

2 Getting lots of Audit Failures in Event Viewer > Security on Windows Server 2008 R2 2015-05-15T09:58:12.580

2 SSH Private Key Authentication Failing 2015-05-21T21:45:10.373

2 Generating SSH and GnuPG keys on a remote server. Key management best practices 2015-06-03T11:23:17.607

2 OSX - Custom lockscreen incorrect password script 2015-06-04T21:48:51.503

2 How to set up a password to protect bitlocker key with tpm? 2015-06-05T16:01:47.527

2 Multi-factor authentication to 2012 RDS farm, preferably client certs? 2015-06-18T11:00:26.707

2 Can VPN steal passwords from client? 2015-06-22T19:56:28.527

2 Is using an open public wifi network more insecure than using a password protected public wifi network? 2015-07-06T21:05:54.757

2 Is FTP on router secure? 2015-07-12T17:04:01.333

2 Firefox 39 - Secure Connection Failed - weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message 2015-07-19T20:04:56.677

2 UAC settings are automatically disabled at least once a day 2015-07-24T08:51:39.843

2 Why is my computer listed twice in my network on two different ip's one ending in .255? 2015-07-29T12:54:18.147

2 How to check OS X installed security updates 2015-08-15T09:45:52.680

2 disabling root ssh access not working 2015-08-17T10:42:06.367

2 Programs accessing hidden files and folders 2015-08-19T20:36:23.560

2 Can't edit Local Security Policy 2015-08-27T12:36:17.137

2 How can a forwarded email know the forwarded-to email address? 2015-08-28T05:08:15.003

2 Mozilla Firefox won't connect to Google, IE can 2015-08-28T14:07:16.333

2 How to prevent my operating system from extracting password dumps? 2015-09-11T05:12:34.737

2 Folder I didn't create with numbers and letters in secondary drive. What it is and what is safer to do? 2015-09-16T14:18:09.253

2 Is it possible to hack my encrypted home by getting root access? 2015-09-20T22:20:41.753

2 How to allow only specific applications to access network? 2015-10-02T21:45:53.523

2 Encrypting home folder in Debian 2015-10-10T04:42:54.797

2 How does eBlocker automatically intercept network traffic? 2015-10-13T14:38:25.710

2 CentOS 7 security updates 2015-10-16T06:42:20.757

2 Why is session reuse useful in FTPS? 2015-10-20T04:30:13.210

2 What happens if permissions on the root directory ( / ) are set to 777? 2015-10-21T01:40:52.963

2 Why are there strange postal addresses in my Chrome auto-fill settings? 2015-10-21T21:39:38.190

2 How secure is VeraCrypt by IDRIX when compared to the now defunct TrueCrypt? 2015-10-24T20:58:42.730

2 Are there safety concerns for leaving a tablet plugged in permanently? 2015-10-26T23:55:34.320

2 Hide server location 2015-11-03T06:16:22.013

2 Why does Linux have both a shadow file and passwd file? 2015-11-04T06:01:11.123

2 How to automatically activate auditing on Office 365? 2015-12-03T14:58:36.980

2 How does a DNS response contain so much information? 2015-12-14T03:40:33.600

2 Is there a way to verify if e-mail was delivered only using SSL connection? 2015-12-14T13:14:40.140

2 Are symbolic links in /usr/local/bin to scripts in users home directory a security risk? 2015-12-16T10:22:10.937

2 Random Images On Websites.. Goes Away When I Clear My Cache 2015-12-17T14:39:59.310

2 Nvidia Geforce Experience is asking for access to a protected item: password for CryptoAPI Private Key, what does that mean? 2015-12-25T10:51:17.410

2 Portable method for encrypting a usb partition that works on Windows and Linux 2016-01-12T02:36:21.730

2 Does someone know why I am asking to security check? 2016-01-16T17:41:33.553

2 Linux Private RSA key secure storage 2016-01-18T16:01:47.403

2 How can I create a Windows 8.1/10 user account that mirrors a guest account 2016-01-21T18:31:19.090

2 Are full paths kept private by Firefox, or are they disclosed to websites? 2016-01-26T13:14:46.227

2 Chrome has some extensions I didn't install 2016-01-28T10:25:22.120

2 True Crypt Alternative For Encrypting Drives 2016-02-06T05:51:46.793

2 How to login ssh without a password using the ssh host key? 2016-02-10T21:10:17.623

2 Does HTTPS/SSL make sense on a local network? 2016-02-12T17:11:33.210

2 Security: Is the Raspberry Pi really stateless? 2016-02-20T11:12:12.517

2 Linix Mint Live CD: DNS not working, but will ping out fine 2016-02-20T23:28:51.607

2 centos upgrade openssl - CVE-2016-0800 - drown attack 2016-03-03T16:08:31.390

2 Username or password is incorrect: why not specify which? 2016-03-04T16:57:18.397

2 Disable Checkpoint Endpoint Security Policy 2016-03-15T13:22:42.367

2 Web Server Security : www directory 2016-03-31T14:11:22.377

2 Is there a way to display a watermark on the screen at all times? 2016-04-04T07:36:55.333

2 Can the SAM database be encrypted with EFS to prevent offline password cracking? 2016-04-10T11:40:45.287

2 Secure Chrome passwords against WebBrowserPassView 2016-04-10T14:32:26.357