Most Popular
1500 questions
41
votes
6 answers
How "scrambled" is the data on a RAID5 disk?
My concern is the disposal of a replaced disk from a private RAID5 disk array.
I have had to replace a disk from my personal RAID5 disk-array. It had started developing errors, so out it went.
But now, I have this disk lying on my desk and that…
Mausy5043
- 521
- 4
- 6
41
votes
2 answers
Can advertisements read cookies of the website it is on?
I know many ads can store third-party cookies, but what about reading cookies? If so, what stops them from reading the session id to perform session hijacking?
user3500869
- 483
- 4
- 6
41
votes
7 answers
Can we tamper-proof a game that's sold along with the Windows machine it runs on?
We want to protect a game that is basically sold with the computer containing it. The security is done this way:
The HDD is encrypted using hardware TPM 1.2, which holds a unique key to decrypt the OS only in that specific computer. So Windows will…
youns
- 591
- 1
- 4
- 5
41
votes
5 answers
Is it safe to upload & scan personal files on VirusTotal?
I had an idea to make a plugin for one of my email clients where my users will be able to upload & scan attachments using VirusTotal service, but then again I was worried about their privacy and security of uploading personal files which may have…
Mirsad
- 10,195
- 8
- 34
- 54
41
votes
4 answers
Are there any known cases of antivirus software intentionally sending false alarms?
First things first, I'm not asking this question because of any specific alarm on my PC that I suspect to be false.
It's just that from the perspective of the software industry, it would make some sense to implement false alarms every now and then,…
MaxD
- 503
- 4
- 9
41
votes
3 answers
Can anti-virus/virus protection be used to spy on you?
I'm a complete noob when it comes to these subjects. But here goes...
Let's say someone is using a VPN, TOR, or some other tool to enhance their privacy. As I understand it, you are discouraged from using plugins, various apps, and other things as…
Lancadin
- 509
- 4
- 7
41
votes
6 answers
Why hasn't it become the norm to inhibit repeated password guesses?
Everyone is aware of the convention/need for strong passwords. With the number of different kinds of clues people can use in their passwords, plus the various permutations of caps and digit-letter substitution, a hacker would need to make many…
donjuedo
- 659
- 1
- 5
- 8
41
votes
7 answers
What are some important concepts to teach developers about cross-site scripting (XSS)?
I'm helping with a one-hour training for developers (~100 of them) on cross-site scripting. What are some concepts you think are indispensable to get across to them? Right now we have:
Difference between reflected and stored
Layers of defense…
mcgyver5
- 6,874
- 2
- 27
- 47
41
votes
2 answers
What triggers Google's reCAPTCHA
I noticed that Google's "I am not a robot" reCAPTCHA forces me to check correct images on my computer. I installed a virtual machine and tried there. Same thing. Used proxy. Same thing too. Then I used another computer in the same network (same…
sanjihan
- 639
- 2
- 7
- 11
41
votes
2 answers
Why hasn't anyone taken over Tor yet?
Tor is known to encrypt the transferred content and the meta information by layering the encryption.
I know there have been correlation attacks that deanonymized some users by federal agencies.
Why do they not take over the system?
There are ~7000…
N. Nowak
- 585
- 4
- 13
41
votes
4 answers
Evaluating the security of home security cameras
My parents have a vacation home out in the country and are looking to setup a home surveillance system for remote viewing. I've heard that there can be serious vulnerabilities in these products. What are some guidelines I could use to help evaluate…
mercurial
- 908
- 1
- 9
- 17
41
votes
7 answers
Somebody hacked my router and changed my wifi SSID
One of my neighbours hacked the password of my router and he uses my limited internet package. I change the wifi SSID almost daily, but he can hack it easily.
Today, he changed the SSID to a hate speech "insult".
How can I stop him? I need a quick…
user2824371
- 539
- 1
- 4
- 7
41
votes
7 answers
Is there any legitimate reason to install yourself as a root CA?
Follow up from comments on another question.
Is there any reason as to why you might install yourself as a root CA on your own network? The only reason I can think of is forcing computers in the network to trust your own self signed certificates…
Dan
- 769
- 7
- 17
41
votes
5 answers
Is this an evidence of a Skype communication being spied on?
A couple of days ago I was having a conversation using Skype, then I wanted to share a link to a page with the interlocutor. I didn't want to let her understand the link content by just looking at the URL so I shortened it with Google shortening…
Matteo Umili
- 901
- 2
- 8
- 11
40
votes
3 answers
Is Ghostery safe to use?
I've heard about Ghostery, a browser extension/plugin that blocks web trackers. But according to this link it sells our data. Are add-ons and plugins open source in Firefox? Is there another alternative to Ghostery?
CatCoder
- 559
- 1
- 5
- 8