Tag: security

8 Are automatic security updates recommended for Ubuntu Server 2013-10-16T19:18:13.907

8 How can I be sure that a Google Chrome extension isn't doing evil things? 2013-10-27T19:04:20.680

8 How does one verify the PGP RSA and/or DSA checksum signatures for putty? 2013-12-25T21:05:54.703

8 How safe is it to open ports on your router? 2013-12-26T21:01:40.933

8 Did my computer unlock itself? 2014-01-29T17:56:34.270

8 Run unsigned Java applets 2014-09-09T01:16:57.173

8 Convenient way to check AUR PKGBUILD against malicious code? 2014-09-22T10:09:16.420

8 How to whitelist an IPv6 address in VPC security groups on AWS? 2015-08-21T19:57:07.637

8 fail2ban ban multiply recidive hosts 2015-09-24T15:38:10.450

8 Is being a Tor exit node dangerous? 2015-12-14T16:06:06.050

8 How can I add a certificate exception for an HSTS-protected site in Firefox? 2016-04-18T13:16:14.767

8 Is it safe to edit the global PATH environment variable? 2016-07-24T00:40:51.817

8 Can hackers enable the camera after the user disabled it? 2019-05-01T21:07:19.860

7 How do I hide the "Saved Passwords" button in Firefox? 2009-07-24T13:44:30.840

7 Running without admin rights: As users, what can we do to get apps working (that demand admin rights)? 2009-08-07T12:51:00.033

7 Why can't I connect to the wireless network after the network password was changed? 2009-08-29T23:05:48.940

7 Is there a way to untaint html documents downloaded from the Internet 2009-11-09T00:55:21.900

7 Integrate GnuPG with Outlook 2009-11-28T08:37:34.570

7 VPN for a small organization 2010-01-08T15:21:43.387

7 What kind of information can my University gather regarding my internet use on the University’s network? 2010-01-22T05:10:04.820

7 Good forums about hacking/computer security issues 2010-01-22T17:25:22.010

7 Is software from NCH Software safe? 2010-01-23T00:17:16.480

7 Can you paint on the label side of a CD? If so, what kinds of paint would be safe for the drives? 2010-01-25T06:42:36.383

7 Checking if computer is compromised? 2010-02-05T16:21:53.767

7 Turn off "unknown publisher" message for older Windows application? 2010-03-02T01:48:03.803

7 Why do browsers have so many possible exploits? 2010-03-14T22:33:33.100

7 What and how strong is 128bit RC4? 2010-04-02T11:50:23.753

7 security concerns in dual-boot Linux, Windows system? 2009-03-14T04:25:02.110

7 Windows 7 : Any way to disable "show caracter" in WIFI network properties? 2010-04-28T19:22:18.873

7 Windows Server 2008 Create Symbolic Link, updated Security Policy still gives privilege error 2010-06-04T19:57:04.780

7 Is it possible for hackers to steal password stored in your browser? 2010-08-29T10:04:19.343

7 Is it safe to use my mobile headset on my PC? 2011-01-11T04:10:59.400

7 Where is the MachineKeys folder in Windows 7? 2011-02-01T16:45:28.773

7 Make Keepass database accept, but not require, two unlocking methods 2011-02-02T00:59:02.113

7 Encrypting a user's directory in Windows 7 2011-02-12T03:15:17.047

7 Security threat caused by Dropbox? 2011-04-12T04:27:21.477

7 How to intentionally mess up a Mac? 2011-05-05T21:49:33.757

7 Security on wireless mouse and keyboard 2011-05-19T13:49:22.167

7 How can I get the prompt of "Would you like to install this device software?" in Windows 2011-05-26T05:17:12.317

7 Why do some packages require their own user to run? 2011-06-19T21:53:55.083

7 On an unencrypted public wi-fi hotspot, what exactly is a packet sniffer doing to get another computer's packet? 2011-06-23T15:08:40.213

7 Are there any security benefits to running as a Standard User in Windows 7 with UAC turned all the way up? 2011-07-13T18:02:56.677

7 Easy way to remove unused security descriptors? 2011-07-15T10:59:35.820

7 How to configure OS X Lion to automatically accept requests for ScreenSharing 2011-07-25T02:41:40.813

7 I left my .git directory readable by the web server, what risks do I have? 2011-08-24T14:17:28.747

7 Is LastPass vulnerable to FireSheep attacks? 2011-09-24T02:58:24.223

7 Verifying that open source software hasn't been tampered with 2011-09-27T14:00:57.150

7 Media Sanitation 2011-10-03T14:00:04.157

7 How do I browse a hard drive that has viruses? 2011-10-12T19:08:23.533

7 Silently Skip Windows 7 UAC Prompts? 2011-12-02T18:59:36.463

7 How can I stop users being able to access services bound to localhost via SSH port forwarding? 2011-12-17T10:01:09.923

7 Are world-readable/writable/executable links in /usr/bin security holes? 2012-02-28T18:02:55.087

7 Rock-solid hardening of a Windows 7 system? 2012-05-07T14:29:04.067

7 Does disabling IPv6 decrease my surface area of attack and increase performance? 2012-05-14T16:32:02.920

7 Does the size of a RSA key cipher have any impact on my internet connection? 2012-05-24T20:14:58.590

7 Group Policy: Block access to \\localhost\C$ 2012-12-10T22:58:23.107

7 How do I make my folders inaccessible by other administrator accounts on Windows 8? 2013-02-21T17:38:22.583

7 How to scan and detect spying software 2013-05-14T20:46:01.407

7 Webcam automatically takes picture when the computer wakes up 2013-07-04T01:02:03.727

7 Microsoft Security Essentials does not turn on at startup 2013-09-03T11:34:20.847

7 How can you find out if xlsx and docx files are safe to open? 2013-09-08T01:47:34.380

7 Is it safe to publicly share Minidump files? 2013-10-14T10:06:44.557

7 Windows 8.1: administrator account has access denied to other partitions 2013-12-26T20:53:06.430

7 Is smearing on an LCD monitor possibly a sign of having a splice on the monitor cable? 2014-01-07T16:22:20.673

7 Encrypt file using PGP/GPG having multiple recipients 2014-01-15T09:54:01.630

7 How is LUKS dm-crypt secure if the key is stored with the encrypted data? 2014-02-20T05:36:52.043

7 How to make xampp secure 2015-02-02T13:13:05.587

7 How can I disable "ConnectedPDF"? (When Foxit PDF Cloud is unwanted) 2016-07-10T09:41:27.820

7 What router settings would prevent me from accessing CSS files via https? 2016-08-03T02:26:34.310

7 DHCPD logs show PC's requesting IP addresses from router when they are turned off. Are our log files incorrect? 2016-11-18T13:11:59.703

7 How to verify a download file using a .sig file and public key, in Windows 10? 2017-11-15T10:01:44.227

7 Increase security for remote desktop machine - use 2FA and/or limit to LAN connection only? 2018-02-11T18:24:30.253

6 Safe access to my home network subversion repository 2009-07-26T02:58:46.360

6 What are the guidelines for creation of a secure passwords? 2009-07-30T02:45:37.380

6 How to avoid Windows Genuine Advantage for an XP update? 2009-09-17T22:54:46.190

6 How secure is Time Machine/FileVault/Dropbox/Google? 2009-10-04T12:23:04.543

6 Is it safe to publish my OpenID? 2009-10-05T20:11:33.617

6 Worms vs Virus what's the difference? 2009-10-09T16:30:59.953

6 Using a decoy operating system, with another OS hidden by TrueCrypt? 2009-10-12T19:02:00.853

6 Does Secure Empty Trash work on Mac w SSD? 2009-12-17T21:20:15.360

6 Windows 7 indicates "you need permission to perform this action" (deleting file) 2010-01-12T06:33:33.397

6 Local Password Management 2010-01-19T20:19:36.783

6 Is it safe to put a Mac directly on the internet? 2010-02-16T10:31:09.293

6 Tools to monitor hack attempts/port sniffing 2010-02-27T19:18:58.230

6 Where to put shared user data on Windows 7? 2010-02-26T20:28:17.120

6 Firefox's master password does not protect my web accounts 2010-03-13T12:45:02.950

6 How do I deny access to everybody but me in Windows 7? 2010-04-11T05:15:48.783

6 How can I read password protected Word files on OS X? 2010-04-25T19:19:51.707

6 How do I prevent Ubuntu from putting my monitor to sleep? 2010-06-23T18:36:55.837

6 How do you boot linux with networking disabled? 2010-08-27T03:18:54.823

6 Why do cell phones disturb my speaker? 2010-08-31T18:42:31.540

6 How can I log SSH access attempts and keep track of what SSH users end up doing on my server? 2010-09-08T10:37:17.970

6 UAC Status from Command Line 2010-09-24T07:28:54.760

6 Where are Mac user account passwords stored? 2010-10-08T20:36:51.053

6 Trusted Root certificates regularly disappear on Windows 7 2010-12-15T04:04:18.030

6 Connect iPad to windows 7 VPN 2010-12-23T18:34:20.033

6 How do I remove Folder Ownerships? (Windows 7 & Windows XP) 2011-01-31T00:34:47.980

6 Does web browser uses previously saved cache in private browsing? 2011-02-12T05:04:41.873

6 Does WD Drive Lock encrypt the data? 2011-02-22T21:32:50.077