Skip to main content

Top Questions

0 votes
0 answers
23 views

Someone else's external antenna mounted to close to mine? [closed]

0 votes
0 answers
27 views

Issues importing GPG private key and decrypting message [migrated]

0 votes
1 answer
31 views

Can someone use Google Login to take information from you (without informing you)?

8 votes
1 answer
2k views

Is Free Nginx Suspect/Sketchy?

6 votes
3 answers
2k views

Using public-key crypto for all HTTP requests of a session – bad idea?

0 votes
0 answers
13 views

I am getting the very alert in ELK SIEM from different IP ,which I think is False Positive. "ET policy DNS update from external net" [closed]

0 votes
1 answer
63 views

For e-mails without TLS connection, where is the connection not encrypted?

1 vote
1 answer
68 views

Is It Safe to Use a Long-Lived JWT Without a Refresh Token?

7 votes
5 answers
1k views

When Code Signing, what is the point of enhanced security specifically for the private key itself?

1 vote
0 answers
561 views

iVentoy installing unsafe Windows Kernel drivers: Why is this happening? [closed]

0 votes
0 answers
88 views

How do i deauth a client on 5Ghz?

1 vote
0 answers
15 views

Anyway to install a separate firmware in a motherboard [migrated]

-1 votes
0 answers
28 views

Geeks for Geeks Video Completion Tracking Issue with Speed Control [closed]

1 vote
0 answers
42 views

Is it possible to firewall a named pipe connection?

1 vote
1 answer
65 views

Can biometrics be intercepted locally?

1 vote
1 answer
31 views

libreoffice2john produces hash for old ODF file, but JtR does not recognize

2 votes
0 answers
46 views

Is there an official, or accepted, recommendation to turn off autocomplete for bank account details

1 vote
0 answers
33 views

Can setting a value in localStorage bypass PayPal's 2FA during support chat? [closed]

1 vote
1 answer
69 views

ModSecurity: How to whitelist all cookies EXCEPT a few specific ones?

1 vote
0 answers
36 views

Poisoned Google search result on legitimate website [closed]

11 votes
2 answers
3k views

What are the preferred ways to exchange public keys physically?

6 votes
3 answers
1k views

What DOESN'T change when signing Certificate is renewed?

3 votes
5 answers
2k views

What is the drawback of always generating passphrases for the user?

0 votes
0 answers
19 views

Network isolation in a private security Endpoint Agent [closed]

0 votes
1 answer
26 views

How do I ensure that a file remains as I expect it to on my webserver?

0 votes
0 answers
48 views

HMAC Verification Failures in AES-256-CBC Encryption with Bash [closed]

2 votes
2 answers
157 views

Extract CRT and KEY from signed PEM file without the openssl tool

9 votes
3 answers
3k views

Overlap for One-Time Passwords

0 votes
0 answers
12 views

Reverse shell not working with python server [closed]

4 votes
1 answer
198 views

Overlong Encoding Paired with bits sequence of \ is %c05c seems incorrect

2 votes
1 answer
49 views

Is it best practice to expose tenant login configurations via a public GET endpoint for Auth0?

9 votes
3 answers
3k views

Is it acceptable to ignore potential XSS payloads if they are not executed on our side?

4 votes
2 answers
702 views

Are truncated SHA-256 hashes safe enough when collisions are not a risk?

5 votes
2 answers
1k views

Accessing a database publicly via HTTPS API vs. native but with client certificates

2 votes
1 answer
108 views

How worried should I be about firmware level persistance after a security breach?

-2 votes
0 answers
53 views

Phone and computer hacked into [closed]

3 votes
2 answers
883 views

Hiding information in the SAN field of a certificate

1 vote
1 answer
34 views

Combining nonce and CSRF for HTTP form submission

13 votes
4 answers
3k views

Cryptographic strength of VeraCrypt

3 votes
2 answers
711 views

Are client certificates a secure way of having publicly facing SQL database?

1 vote
0 answers
17 views

What options are there for live output of nmap scan results? [duplicate]

4 votes
2 answers
1k views

How to check if a file contains exploit for a specific zero day vulnerability?

3 votes
0 answers
76 views

Impossible optimization in IKE Intermediate RFC? [migrated]

2 votes
1 answer
198 views

For the same private key, I have two slightly different public keys. Is it normal?

1 vote
0 answers
38 views

Are secrets from automatically unlocked keychain in Ubuntu 24.04 Seahorse accessible for any application?

1 vote
0 answers
35 views

LinkedIn website automatically gets my email address in Edge without consent, can all websites I browse silently get my email? [closed]

3 votes
1 answer
1k views

Can a public certificate provider impersonate an AD?

3 votes
1 answer
255 views

What is the hashed password in the master.passwd file?


Looking for more? Browse the complete list of questions, or popular tags. Help us answer unanswered questions.