Skip to main content

Questions tagged [security]

The protection of computer systems and information from threats such as theft or data destruction.

1 vote
1 answer
41 views

bypass server configuration and hit on ip directly

we are using ip tables to only allow connection coming to the server from cloudflare proxy , and deny others . and we have set up the named_conf to no recursion , enabled syn cookie and these stuff . ...
1 vote
1 answer
10k views

Hashcat: "Failed to parse hashes using the 'native hashcat' format"

I tried to use Hashcat on a Word password-protected doc, but I got this error: C:\Users\User\Desktop\hashcat-5.1.0>hashcat64.exe hashcat -a 0 -m 9600 --username -o pass.txt hash.txt rockyou-...
1 vote
1 answer
5k views

Security folder missing from the registry HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Security

I need to add a DWORD value in HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Security but the Security folder is missing in the registry. I have Office365 (version 1903, build 11425....
0 votes
0 answers
18 views

Script that checks whether agents running on workstation need idea where to write output [closed]

I want to write a script that checks whether specific software is running on a computer, i manage around 200 computers and I think this is the best way to check whether the necessary security agents ...
0 votes
1 answer
44 views

How to isolate an outward-facing server VM from an internal virtual machine cluster?

I will do the best I can to describe what I'm actually looking to do here, but first - the setup. I have a whole internal network connected together with a managed layer 2 or 3 network switch, with ...
2 votes
1 answer
4k views

List of folders where security group grants access to (Windows server 2003)

My question is very simple and I think many people are trying to find out answer so please try to help. In Active Directory, when administrating server, you can create or list security groups but the ...
0 votes
0 answers
22 views

Brave Browser Preemptively Downloading Files?

Sometimes, when I was downloading large artifact archives from a gitlab project (~500 MB) in my Brave Browser I was positively surprised when it was partially done already from the start (varying from ...
7 votes
3 answers
25k views

We can't verify who created this file

I am getting this warning We can't verify who created this file I have an exe file which I need to run on startup using GPO. I found how to either exclude the whole server where the file is or ...
1 vote
1 answer
8k views

How to get “failed login attempts since the last successful login” count as a variable?

When I log in to a server I see: Last failed login: Fri Jul 17 12:47:01 CEST 2020 from 111.222.333.444 on ssh:notty There were 2713 failed login attempts since the last successful login. Last login: ...
0 votes
1 answer
18 views

fail2ban iptables rule has no effect for SoftEther VPN ... unless sshd rule is place

I am completely perplexed as to why this doesn't work. This is my bare iptables ruleset: # iptables -L -n Chain INPUT (policy ACCEPT) target prot opt source destination Chain ...
1 vote
0 answers
29 views

Keycloak access to private ssl key file

I use letsencrypt certs for ssl and need to setup a keycloak to work with these certificates. Keycloak is running in the docker container, if it is important. So, I mount certs as volumes to the ...
0 votes
1 answer
1k views

How do I use Mullvad's post-quantum safe tunnels with another WireGuard VPN client?

Mullvad includes setup instructions on their website for using their service with WireGuard clients on different platforms. Is it possible to use their quantum-resistant tunnel feature in a WireGuard ...
0 votes
0 answers
47 views

An installed program has been deleted by someone - how to find their identity?

13 days ago I asked about how to uncompress files downloaded from the arXiv math site, and I got the following response: Downloading from the arXiv site and uncompressing I downloaded files from the 7-...
4 votes
1 answer
3k views

What does "something you are" mean as a verification factor? Can you give some examples?

Company X uses multi-factor authentication (MFA) to decrease the likelihood of a successful cyber-attacks by requiring one or more additional verification factors: something you know, something you ...
0 votes
0 answers
39 views

One Drive Security Risk

about a year ago I bought an account for games on G2G , thats was a MIcrosoft store account , I logged in the MCS store and xbox with that account. Then I loggout back to my personal account not long ...

15 30 50 per page
1
2 3 4 5
367