menu

Recent questions tagged information-security

1 vote
2 answers
What-are some good portals/forums related to cybersecurity? I want to delve into cybersecurity and know as soon as possible what foms I can rely on ...
1 vote
3 answers
Turns out to be forcibly connected to a password-protected wifi network, is that possible? Good day to you all! Maybe someone can explain what the hell happened. When I arrived at work, as usual, I took my iPad and found something I hadn't seen before. The iPa ...
2 votes
1 answer
Is it possible to find out the address where the webhook is being listened to? I've been thinking about the security of the project, and these are the questions I have: I am waiting for a callback at a certain address. Is there any way to find ou ...
by Desead
asked Sep 21, 2021
1 vote
5 answers
How do I keep myself safe at work when using WiFi? There is a WiFi network at work. Is it possible to access my mail on my phone through this network if I browse it. If so, how do I protect myself from it? ...
by Gast005
asked Sep 21, 2021
1 vote
6 answers
Checking viruses on a flash drive using linux? Hello. At work I was given the task of installing ubuntu on a computer and using it to check for viruses on thumb drives. Can ubuntu detect viruses that were written for ...
2 votes
3 answers
Can uploading pictures of vendor products compromise site security? Each supplier has the opportunity to upload his product catalog on our site through his cabinet. When uploading products, we download pictures according to the url provi ...
by besogonskiy
asked Sep 20, 2021
2 votes
3 answers
How to organize personal safety on the network? Some time ago I came across a video about how to intercept social networking sessions over shared wifi, which prompted an interest in some minimal online security. The d ...
by artmill
asked Sep 20, 2021
2 votes
1 answer
Question about Keycloak and saving the user in the database? Hi all! I started learning Keycloak and I have a few questions: 1)How do I handle a registration event so that I can insert some user data into the database of my appli ...
by sasuke22
asked Sep 20, 2021
8 votes
6 answers
Is it dangerous to give remote access to a laptop? Hey guys, hi everyone! I decided to consult with you, I have not long ago, the Chinese offered me a deal, I created an account on Upwork, he works there and pay me 15- ...
by Panda_Code
asked Sep 19, 2021
1 vote
1 answer
How to improve Linux security? Consider clean versions of Debian 10 and (B)Ubuntu 16. What tools and configurations need to be checked? For example firewall configurations? Naturally, we will leav ...
by BonBonSlick
asked Sep 18, 2021
1 vote
2 answers
1 vote
2 answers
What is meant by remote access to ISPN? Good afternoon. Let's assume that I have an ISPN of the participants of the conference scientific. It is possible to register for the conference via the Internet, the se ...
1 vote
2 answers
What are the specializations in the field of IS? What are the specializations in information security? They mostly talk about pentesters and specialists in secure software development, but I would like to know about ot ...
by HPositron
asked Sep 15, 2021
3 votes
1 answer
image
Why does Rostelecom block ESNI traffic? Recently, it has become really annoying that Rostelekom for some reason blocks ESNI traffic. I do not know where to go anymore to announce it as publicly as possible. Th ...
1 vote
4 answers
Do I understand secure protocols correctly? I started to explore the topic of encrypted communication and write a small application for data exchange. The idea is something like this: The same encryption key is ...
by 12rbah
asked Apr 1, 2021
1 vote
2 answers
Transmitting keys within a TLS connection? Hello, everyone. Purpose: to make a secure UDP connection. In order not to write their own handshakes and code for the transmission of encryption keys (symmetric), it wa ...
1 vote
1 answer
Do you need an article on encrypted ofdm signals? I want to write an article on encryption ofdm signals, perhaps a generalization of physical layer encryption methods. Is it necessary? Write your ideas, please. I do not ...
1 vote
1 answer
What is usually meant by "payload" in security audit events? For example, there is an audit log SIEM arcsight, you need to identify fields with a payload, what is it? ...
by KsMa
asked Mar 29, 2021
2 votes
2 answers
How do I check for a malicious file? Good day! There is a malicious file (VirusTotal at least gives almost 1010 on analysis). There is also a desire to track all the "body movements" in the system after it ...
1 vote
2 answers
How do I protect input fields that may contain html tags from XSS attacks? I have a thematic portal where users can publish their material. This material may contain HTML tags, so it cannot be rendered through the htmlspecialchars() function. Y ...
by IvanIF
asked Mar 29, 2021