Tag: security

14 Are On-Screen Keyboards Really More Secure? 2009-08-26T13:25:38.500

14 Is it possible to encrypt home folder on windows 7? 2009-10-29T10:37:49.407

14 Firefox: This connection is untrusted + Behind corporate firewall 2010-03-02T15:50:17.193

14 Does PDFTK respect PDF security flags? 2010-11-30T08:55:28.407

14 Removing wlan0mon created by Kismet 2011-02-06T16:52:30.830

14 What are possible security issues with an SSH daemon? 2011-02-10T20:47:29.577

14 How can I safely open a suspicious email? 2011-08-24T01:47:07.320

14 Can I password protect an NFS share? 2011-08-25T16:17:45.013

14 How to dump the Windows SAM file while the system is running? 2011-12-03T18:50:12.727

14 Is the wifi password stored somewhere in windows-7? 2012-05-15T04:51:33.993

14 How can I encrypt the swap file under Windows 7? 2013-06-21T13:29:13.113

14 How can I edit banknote images in Photoshop CS? 2013-12-31T08:28:32.493

14 Security concerns of displaying ssh private key 2014-01-27T15:41:49.123

14 Why can't we use/set function keys as password keys? 2015-12-02T11:18:10.833

14 How to block everything (all incoming and outgoing internet access) except those applications are in firewall white-list? 2017-02-25T12:15:23.787

14 Disable file sharing on Windows XP 2017-05-14T02:02:31.580

13 Prevent installation of IE toolbars? 2009-07-20T17:27:11.840

13 Which ports to open for Microsoft SQL Server? 2009-08-29T21:19:15.503

13 How to encrypt an USB stick? 2009-11-25T13:10:24.150

13 Do computer system units actually go up in flames? 2009-12-30T08:29:29.870

13 KeePass justification 2010-04-23T20:51:55.797

13 Is Steam for Mac effectively running as superuser? 2010-05-13T16:36:49.163

13 How, if at all, do SSH keys differ from asymmetric keys used for other purposes? 2011-04-22T04:13:20.797

13 How to get the real IP address of someone using a proxy? 2011-05-17T20:49:26.053

13 Ubuntu: default access mode (permissions) for users home dir (/home/user) 2011-06-29T13:34:24.963

13 Will microwaving a flash drive destroy the data on it? 2011-12-31T10:27:21.820

13 How do I configure my Linksys routers to resist the WPS brute-force vulnerability? 2012-01-04T18:12:22.150

13 How to use OpenVPN through a restrictive firewall? 2012-09-25T20:24:04.657

13 Stopping people from ssh(ing) into my Ubuntu machine 2012-12-12T11:02:26.570

13 How to find out when a disc (DVD) has been written/burned? 2013-02-28T22:07:02.510

13 How to migrate my old PGP key to a more secure algorithm? 2013-06-30T16:10:57.037

13 How can I render an SSD permanently inoperable with no chance of data recovery? 2013-09-01T15:00:54.677

13 Possible to playback RFID card using NFC functionality on phone? 2013-10-02T11:18:39.490

13 Chrome - Why am I automatically authenticated to a web app even after clearing browser cookies? 2013-10-24T15:06:14.627

13 How can I know if someone has logged into my account in Windows 7? 2014-03-10T08:42:26.010

13 Bypass Windows 10 UAC "This app has been blocked for your protection." 2015-06-23T05:28:39.747

13 Let's encrypt + certbot: where is the private key 2017-04-01T10:47:06.793

12 What makes the address bar in IE turn green? 2009-08-03T16:26:17.053

12 How to disable Utility Manager (Windows Key + U) 2009-08-06T15:35:35.560

12 Why is MAC-based authentication insecure? 2009-08-07T02:21:50.517

12 How can you tell if a Windows machine is part of a Botnet? 2009-08-07T18:22:21.217

12 How can I detect unauthorized access on my 802.11 g/n network? 2009-08-07T19:03:01.230

12 Change EUID of running process 2009-10-18T08:26:44.023

12 Grant permanent UAC permission to one program? 2010-04-25T19:06:26.667

12 How to report a malicious site to Google, Microsoft, Mozilla, etc. so that they will warn users 2010-12-22T08:26:40.477

12 Is moving an "all-in-one" PC when turned on/off dangerous? 2011-01-06T11:52:23.653

12 Does NAT provide security? 2011-01-25T20:51:15.410

12 Automatically lock screen of Chromebook when lid is closed 2012-06-07T14:39:31.737

12 How do I efficiently generate and validate file checksums? 2013-02-27T17:46:58.130

12 Is it okay to use an administrator account for everyday use if UAC is on? 2013-12-31T20:31:18.733

12 Are SSL's default snake oil certificates truly snake oil as opposed to being genuine honest-to-good certificates? 2014-01-11T12:35:54.517

12 How to respond to Windows Security Alert in Windows 7? 2014-01-21T14:01:59.757

12 How to know which Certificates to leave in my browser, and which to remove 2014-09-29T06:12:06.023

12 A way to trigger an SELinux policy violation? 2015-04-30T17:35:01.463

11 Should I let my browser or the site remember my password, or neither? 2009-07-21T17:03:20.683

11 Recommended offline on-demand virus scanners 2009-08-18T02:43:21.640

11 If Mac code signing is tampered with, what might fail? 2009-09-27T13:55:03.450

11 How to "jail" Java applications in OS X? 2009-09-29T19:20:33.717

11 "Panic Password" on Linux 2009-11-18T15:11:21.697

11 Webcam as a security camera 2009-12-05T00:18:53.477

11 What port needs to be open for Debian to get updates? 2010-03-16T20:54:58.567

11 Difference between Malicious Software Removal Tool, WinDefender, Security Essentials? 2010-04-02T20:34:51.247

11 Secure video chat program as an alternative to Skype 2010-04-03T04:36:00.057

11 Mac OS X security export won't accept passphrase 2010-08-29T04:29:17.610

11 What is the default administrator password? 2008-09-14T21:20:05.873

11 How does Kerberos' preauthentication increase security? 2010-10-16T03:33:01.383

11 How is software hacked and patched? 2010-10-23T10:21:15.183

11 Is it safe to store 1Password data file on DropBox? 2011-06-01T22:58:52.463

11 Running mysql dump in a cron job without exposing passwords 2012-10-21T07:06:35.240

11 How safe is port forwarding in general? 2013-03-05T14:39:21.543

11 Windows XP Mode Vulnerabilities as of April 8th, 2014 2013-10-28T19:02:35.460

11 Automatically lock screen on lid close in Windows 7 2014-01-20T21:28:05.170

11 What's the link between security and processors? 2014-02-12T03:41:27.283

11 How to determine what is running in DLLHOST.EXE that's missing /ProcessID switch? 2014-10-30T18:02:01.663

11 How to configure linux to enforce new users to change their password on first login 2015-02-22T09:08:28.577

11 Does Windows 10's "reset PC and clean the drive" correctly clean the drive? 2015-08-24T07:07:39.777

11 Windows Smart Screen can't be reached in Windows 10? 2015-10-01T10:00:16.423

11 Got shocked by a native dell laptop charger outputting 19.5 V 6.5 A DC. It was REALLY uncomfortable, but was that dangerous? 2016-01-30T23:49:35.667

11 What does the Notification “badge” on MacOS System Preferences icon really mean? 2017-04-02T20:14:44.437

11 How can I make Windows think a file "came from another computer"? 2018-07-24T19:54:57.980

10 How to set up Firefox on Windows to ignore registry settings? 2009-06-29T05:06:36.407

10 How can I make my OS appear as if it is running virtualized? 2009-07-25T21:06:50.077

10 Should I Upgrade My Old Wireless Router? 2009-08-07T00:12:03.403

10 How do you protect your computer from Live CD's? 2009-03-16T23:32:09.820

10 Browser for paranoid people? 2010-01-29T21:26:23.487

10 Top ten security tips for non-technical users 2010-03-30T22:15:04.360

10 How do you hide installed plugins in Firefox? 2010-04-29T16:36:02.247

10 How to add a local file to trusted zone in IE8? 2010-06-05T08:53:56.303

10 How to browse safely? 2009-04-30T14:54:08.833

10 How do I access a shared folder using credentials other than the ones I logged in with? 2011-01-13T00:40:21.513

10 How much data does Chrome really collect? 2011-01-27T14:54:00.670

10 What are Windows ACLs? 2011-02-15T20:51:52.707

10 Why some recovery tools are still able to find deleted files after I purge Recycle Bin, defrag the disk and zero-fill free space? 2011-03-06T07:53:44.187

10 Configure OSX Firewall to Allow SSH Server? 2011-04-02T19:56:36.963

10 Are there any downsides to enabling Hardware Virtualization in the BIOS? 2011-04-21T11:27:13.880

10 What is the SYSTEM group in Windows 7? 2011-04-28T10:37:46.640

10 What generates this message: "*** SECURITY information for hostname ***"? 2011-05-17T17:35:22.453

10 How to run a program as root without "sudo"? 2011-05-31T09:35:25.363

10 Transparent screensaver for linux? 2011-12-01T08:39:27.997