Tag: security

4 Is it feasible to crack ZIP passwords? 2010-01-15T11:24:46.143

4 Is vimperator safe? 2010-01-15T07:19:45.083

4 How do I check if a program can potentially be a virus? 2010-02-14T09:33:34.243

4 Hardware-based security solutions for Windows home PCs? 2010-03-09T12:46:35.833

4 Where can I learn various hacking techniques on the web? 2010-03-23T21:37:16.943

4 Standalone firewall + antivirus or combined security tools? 2010-04-14T13:52:49.037

4 How can I limit other (administrator) users access to my profile? 2010-04-17T22:39:38.123

4 General Website Security 2010-05-10T15:42:31.517

4 How secure is the Subversion connection to an https URL 2010-06-03T16:33:03.703

4 Can a laptop be compromised through WiFi if the machine never connects to a hotspot? 2010-06-06T22:58:51.783

4 Hide installed programs on windows 2010-07-01T15:06:10.437

4 What should I do AFTER finding out that some Trojans were found and deleted on my computer? 2010-07-08T07:29:10.507

4 How can I prevent filesharing in an internet cafe? 2010-07-19T12:38:45.897

4 stop windows 7 from warning me about opening a file 2010-07-25T08:59:53.800

4 Is using Ubuntu Live CD safe for online financial transactions? 2010-07-26T05:59:30.483

4 Mac OS X: Java Applet requests "unrestricted acces" 2010-08-10T21:23:58.567

4 Safety precautions to take while shifting your computer 2010-08-31T18:51:07.493

4 How to change Firefox's referer header for all http requests 2010-09-28T02:05:11.907

4 can I log urls visited with dd-wrt? 2010-10-06T02:13:55.253

4 Using an unecrypted decoy OS with truecrypt hidden OS? 2010-10-14T04:52:34.100

4 How to get full write permission on my second drive after dual boot? 2010-10-18T10:55:41.717

4 Why do sites offer an MD5 hash of a file? 2010-10-18T13:13:15.583

4 If someone is signed into SSH on my computer, can I access their computer? 2010-10-22T01:14:10.540

4 What damage can adobe flash player do to a linux machine? 2010-10-28T05:04:24.990

4 How can I find out if a link is "Clean" or "Dirty"? 2010-10-29T12:20:06.907

4 How can you create CDs with media that cannot be copied? 2010-11-04T08:22:02.607

4 In general, is SFTP unsecure? 2010-11-09T14:27:05.887

4 How to (re)enable the "New" context menu items for an administrator when right-clicking in a folder and selecting New > X? 2010-11-26T15:45:11.320

4 On unencrypted public wifi, what kind of real danger am I in? 2010-12-05T20:59:14.897

4 Are virtual machines safe? 2011-01-23T17:56:21.353

4 DropBox + TrueCrypt - safe for sensitive information? 2011-02-11T18:40:43.483

4 How long will Microsoft support Windows XP Professional? 2011-02-16T13:53:02.050

4 Are there any security concerns when using Windows' default workgroup? 2011-02-27T12:53:42.933

4 Multiple Antivirus Software 2011-03-13T19:13:43.177

4 Are spaces valid components of a password? 2010-02-22T13:23:28.840

4 Is there specialized software for testing the security of a computer? 2011-04-06T12:52:26.223

4 How can I disable these Windows-specific ports? 2011-04-06T14:11:58.417

4 Reproducing limited DVD copy protection 2011-04-14T00:45:16.647

4 Difference Between Microsoft's Safety Scanner and Software Removal Tool 2011-04-20T16:52:13.173

4 Ubuntu install and Dongle Paranoia 2011-04-26T19:44:34.420

4 How to prevent data leak from /tmp without FDE, ramfs, or tmpfs? 2011-04-27T13:29:38.377

4 How can get back the saved password in my workstation? 2011-05-01T08:42:40.527

4 Are WiFi transmissions over an open network encrypted? 2011-05-02T00:45:02.390

4 Potential SSH security problem? 2011-05-04T12:26:17.300

4 Few questions about how to be more secure with passwords (lastpass, onepassword, 2 step auth) 2011-05-11T20:22:27.213

4 Preventing Sendmail Brute Force Attack on Solaris 10 2011-05-14T22:49:51.250

4 Which symmetric key algorithm does SSL use? 2011-05-22T14:33:42.620

4 Do any standard, built-in USB drivers give the USB device full access to system memory? 2011-05-29T17:54:52.327

4 Is Intel Anti-Theft Technology available for individuals? 2011-06-04T12:54:53.790

4 Man in the middle on SSH Tunnel with untrusted server 2011-06-05T08:48:09.070

4 How does SSL work? Isn't there a hole? 2011-07-12T01:09:07.450

4 Weird hits on port 2703 2011-07-22T05:38:10.670

4 How do I detect if someone is stealing my broadband bandwidth? 2011-07-22T18:25:59.133

4 Is there a distribution or a way to completely lockdown Linux from the get go? 2011-07-24T23:37:53.930

4 OS X: How to use proximity of cellphone/iPhone to lock/unlock screen? 2011-08-07T00:44:42.600

4 Is there an open source software to run a 802.1x authenticator (ie. NAS) within Linux? 2011-08-10T16:39:13.000

4 Is Firefox 6.0 a security and stability update? 2011-08-17T20:16:33.860

4 My Mac trying to connect to a possible intruder's machine, that is not in the network anymore 2011-08-28T10:46:11.250

4 Is MySQL login via the -p switch insecure? 2011-08-30T14:42:11.370

4 How can I secure an Ethernet-over-power network? 2011-09-01T02:06:13.023

4 Is it safe to use ImageMagick on user images? 2011-09-08T01:19:03.807

4 protecting Dropbox files - Dropbox & encryption 2011-10-06T23:05:13.653

4 What is the difference between client side and server side certificates? 2011-11-02T02:09:10.017

4 Can I keep my RSA keys when I reinstall Ubuntu? 2011-11-22T01:41:04.727

4 Is it safe to run a LiveCD if the host operating system is infected? 2011-11-22T18:13:37.543

4 What can I do to secure data on my desktop computer against the risk of being stolen? 2011-12-17T17:59:59.443

4 Can we use a cert to package a .zip file to let only people with cert can open the zip? 2012-01-08T15:39:36.167

4 Is it possible to allow users to create files/folders and prevent deleting folders? 2012-01-12T22:46:33.983

4 How to safely store passwords in Irssi? 2012-01-27T12:39:50.380

4 Windows network share on linux server without samba 2012-01-27T12:44:23.523

4 How do I create a safe system on a used computer (running Windows 7) once purchased? 2012-01-30T01:45:44.663

4 Can attackers harvest WiFi passwords by spoofing ESSID? 2012-02-07T12:21:34.050

4 Tor + Public Wi-Fi ... safe? 2012-03-09T09:55:11.847

4 Does telnet client represent a security threat on Windows? 2012-03-13T20:21:43.533

4 How long is a version of OSX supported for security updates? 2012-03-26T04:28:57.470

4 How to block incoming connections from one IP address? 2012-04-12T11:03:00.787

4 How to embed image into Windows Live Mail (Win 7) email signature? 2012-05-04T08:29:50.600

4 Can traffic be inspected through WiFi? 2012-05-04T14:37:43.810

4 IE9 reporting "Virtual Storage Mount Notification" add-on from "EldoS Corporation" is ready for use. Where from and can I trust it? 2012-05-10T15:25:25.117

4 Why does Secunia PSI display a list of insecure Microsoft applications however they are not deemed critical when running Windows Update? 2012-05-20T04:47:19.543

4 Does a VPN make 3g/4g/cellular connections more secure? 2012-06-28T02:21:56.280

4 Do pip and easy_install download Python packages securely? 2012-07-21T09:53:58.670

4 Is it possible/good practice to use same private key for two servers for passwordless login from the same workstation/localserver? 2012-07-26T17:11:23.887

4 Do I have to chmod after ln -s? 2012-07-30T21:09:16.683

4 How does Google two-auth factor work? 2012-08-09T13:47:46.433

4 Is password required for restricted database servers 2012-08-19T12:26:39.177

4 Is it safe to use a laptop AC adapter with 220V power if the AC cable is not rated for 220V? 2012-08-25T00:24:05.270

4 How to securely generate memorable passwords? 2012-08-31T09:08:56.697

4 Bypassing keyloggers - virtual keyboard 2012-09-13T06:58:10.587

4 Best way to authorize a USB device in an organisation? 2012-09-26T08:30:36.493

4 OS X stealth mode: where is it enacted? 2012-10-04T06:56:40.823

4 How to make sure nothing is shared from Windows 8? 2012-10-28T14:18:43.930

4 Can't change owner for a folder even login as build-in admin 2012-11-04T22:00:14.870

4 Lighttpd: Serve all files in directory as static 2012-11-10T15:34:34.070

4 Emptying the trash takes "forever": is using rm -r safe to use in Mac OS X 10.7 (Lion)? 2012-11-16T02:10:08.730

4 Is it insecure to leave open an SSH connection? 2013-01-23T22:46:32.387

4 How do I remove a user account which is invisible on the logon screen or user manager for Windows 7 Home Premium? 2013-03-01T19:34:50.593

4 OpenSSL and what encryption method to use 2013-03-25T16:12:00.103

4 ShieldsUp reports Port 25 "closed" on brand new Linksys N750 router 2013-04-01T18:32:10.247