Newest Questions

0 votes
0 answers
8 views

I would like to be able to store backups on potentially "untrustworthy" sources such as cloud storage. Whilst I could probably get away with a simple encrypted tar file, for a single backup, ...
Sam Coutteau's user avatar
0 votes
1 answer
25 views

I have been experiencing very strange issues: each day I changed my passwords, the next day when I checked, they would be "wrong", and I had to change them again. This intensively happens on ...
River's user avatar
  • 1
1 vote
1 answer
82 views

I noticed that with Linux pam-u2f module whether you are required to input your PIN can be changed by simply editing ~/.config/Yubico/u2f_keys file and either adding +pin to your configuration line or ...
ojs's user avatar
  • 111
5 votes
1 answer
298 views

Apple claims that one time token is created. What is the purpose of that token? What happens with that token? As far as I know when I pay with my physical debit card the information passed the POS ...
ilhan's user avatar
  • 465
0 votes
0 answers
32 views

I'm running a few services for different teams in my organization including a Wordpress site. Today a teamlead messaged me, that none of them is able to log into their accounts anymore. While ...
andii1997's user avatar
  • 101
0 votes
1 answer
37 views

My company has a small call center. Less than 100 people. Currently we do not do any credit card transactions but are looking to do so in the future. One potential client has us using their ...
Magellan Jim's user avatar
6 votes
3 answers
2k views

I use SMS for MFA (yes I know it's bad, but better than no MFA) in an web application. On login an OTP is sent to the user via SMS. This OTP is valid until: it expires after 10 minutes it is ...
Martin's user avatar
  • 161
0 votes
0 answers
18 views

How does Defender for Cloud interpret and normalize these logs? In the Defender console, I see an inbound connection on a DMZ host (acting as an FTP server using vShell), showing Tor IP → internal IP. ...
Sabari A's user avatar
0 votes
0 answers
41 views

When you interact with QSCD on a token do you need the middleware to be issued by a Trusted Service Provider (TSP), or is middleware just a utility which I can reimplement on another platform? Does ...
Desperado's user avatar
  • 101
1 vote
0 answers
44 views

I have an application, myapplication.exe. Through IFEO registry I can attach a debugger, which can be a malicious piece of software for a attacker. Only someone having access to Windows registry can ...
Jyothish Bhaskaran's user avatar
0 votes
1 answer
73 views

I inherited my mom's macbook and want to access it to see if she had any old pictures, recipes, or other files that would be nice to have. However I don't know her username or password. Is there any ...
draikes's user avatar
0 votes
0 answers
51 views

A user accidentally clicked a link in a phishing email. The link led to what appeared to be an online video-course/tutorial site. The user did not enter any credentials, download any files, or ...
maruf's user avatar
  • 101
-1 votes
0 answers
29 views

I am working on my graduation project, and I need to implement Suricata as an IDS/IPS honeypot on EVE-NG. How can I connect it to the routers and switches?
0 votes
1 answer
85 views

In php I am generating a unique random token used as a code and Index for password resets: declare(strict_types=1); namespace App\Domain\Helper; use Ramsey\Uuid\Uuid; use Random\RandomException; ...
Dimitrios Desyllas's user avatar
0 votes
0 answers
4 views

Is there any method to forensically analyse Android mobile memory without rooting the phone. I want to capture malware in my Android phone.
Reza Haider's user avatar

15 30 50 per page
1
2 3 4 5
4678