Most Popular

1500 questions
41
votes
6 answers

How "scrambled" is the data on a RAID5 disk?

My concern is the disposal of a replaced disk from a private RAID5 disk array. I have had to replace a disk from my personal RAID5 disk-array. It had started developing errors, so out it went. But now, I have this disk lying on my desk and that…
Mausy5043
  • 521
  • 4
  • 6
41
votes
2 answers

Can advertisements read cookies of the website it is on?

I know many ads can store third-party cookies, but what about reading cookies? If so, what stops them from reading the session id to perform session hijacking?
user3500869
  • 483
  • 4
  • 6
41
votes
7 answers

Can we tamper-proof a game that's sold along with the Windows machine it runs on?

We want to protect a game that is basically sold with the computer containing it. The security is done this way: The HDD is encrypted using hardware TPM 1.2, which holds a unique key to decrypt the OS only in that specific computer. So Windows will…
youns
  • 591
  • 1
  • 4
  • 5
41
votes
5 answers

Is it safe to upload & scan personal files on VirusTotal?

I had an idea to make a plugin for one of my email clients where my users will be able to upload & scan attachments using VirusTotal service, but then again I was worried about their privacy and security of uploading personal files which may have…
Mirsad
  • 10,195
  • 8
  • 34
  • 54
41
votes
4 answers

Are there any known cases of antivirus software intentionally sending false alarms?

First things first, I'm not asking this question because of any specific alarm on my PC that I suspect to be false. It's just that from the perspective of the software industry, it would make some sense to implement false alarms every now and then,…
MaxD
  • 503
  • 4
  • 9
41
votes
3 answers

Can anti-virus/virus protection be used to spy on you?

I'm a complete noob when it comes to these subjects. But here goes... Let's say someone is using a VPN, TOR, or some other tool to enhance their privacy. As I understand it, you are discouraged from using plugins, various apps, and other things as…
Lancadin
  • 509
  • 4
  • 7
41
votes
6 answers

Why hasn't it become the norm to inhibit repeated password guesses?

Everyone is aware of the convention/need for strong passwords. With the number of different kinds of clues people can use in their passwords, plus the various permutations of caps and digit-letter substitution, a hacker would need to make many…
donjuedo
  • 659
  • 1
  • 5
  • 8
41
votes
7 answers

What are some important concepts to teach developers about cross-site scripting (XSS)?

I'm helping with a one-hour training for developers (~100 of them) on cross-site scripting. What are some concepts you think are indispensable to get across to them? Right now we have: Difference between reflected and stored Layers of defense…
mcgyver5
  • 6,874
  • 2
  • 27
  • 47
41
votes
2 answers

What triggers Google's reCAPTCHA

I noticed that Google's "I am not a robot" reCAPTCHA forces me to check correct images on my computer. I installed a virtual machine and tried there. Same thing. Used proxy. Same thing too. Then I used another computer in the same network (same…
sanjihan
  • 639
  • 2
  • 7
  • 11
41
votes
2 answers

Why hasn't anyone taken over Tor yet?

Tor is known to encrypt the transferred content and the meta information by layering the encryption. I know there have been correlation attacks that deanonymized some users by federal agencies. Why do they not take over the system? There are ~7000…
N. Nowak
  • 585
  • 4
  • 13
41
votes
4 answers

Evaluating the security of home security cameras

My parents have a vacation home out in the country and are looking to setup a home surveillance system for remote viewing. I've heard that there can be serious vulnerabilities in these products. What are some guidelines I could use to help evaluate…
mercurial
  • 908
  • 1
  • 9
  • 17
41
votes
7 answers

Somebody hacked my router and changed my wifi SSID

One of my neighbours hacked the password of my router and he uses my limited internet package. I change the wifi SSID almost daily, but he can hack it easily. Today, he changed the SSID to a hate speech "insult". How can I stop him? I need a quick…
user2824371
  • 539
  • 1
  • 4
  • 7
41
votes
7 answers

Is there any legitimate reason to install yourself as a root CA?

Follow up from comments on another question. Is there any reason as to why you might install yourself as a root CA on your own network? The only reason I can think of is forcing computers in the network to trust your own self signed certificates…
Dan
  • 769
  • 7
  • 17
41
votes
5 answers

Is this an evidence of a Skype communication being spied on?

A couple of days ago I was having a conversation using Skype, then I wanted to share a link to a page with the interlocutor. I didn't want to let her understand the link content by just looking at the URL so I shortened it with Google shortening…
Matteo Umili
  • 901
  • 2
  • 8
  • 11
40
votes
3 answers

Is Ghostery safe to use?

I've heard about Ghostery, a browser extension/plugin that blocks web trackers. But according to this link it sells our data. Are add-ons and plugins open source in Firefox? Is there another alternative to Ghostery?
CatCoder
  • 559
  • 1
  • 5
  • 8