Skip to main content

Questions tagged [security]

The protection of computer systems and information from threats such as theft or data destruction.

1 vote
1 answer
22 views

Trying to perform MiTM on an IoT device that cannot set gateway or proxy

I am currently trying to perform MiTM attack on a target IoT device (192.168.0.10) which does not provide any means to manually setup network related parameters. The attacker is a VM hosted on my PC, ...
Jimmy.D's user avatar
  • 113
0 votes
0 answers
14 views

BitLocker Encryption Stuck on 0.9%

As the title says, bitlocker encryption for my drive is at 0.9%, after running for many combined hours. Running many commands that interact with bitlocker or the drive hang the console and all other ...
John Edwards's user avatar
1 vote
1 answer
43 views

Should cos-101-17162-463-55 contain a newer ssh version to fix CVE-2024-6387?

Google is stating, that the system image cos-101-17162-463-55 is not vulnerable to the security vulnerability CVE-2024-6387 but they don't say why. I'm confused as I've installed cos-101-17162-463-55: ...
hb0's user avatar
  • 261
1 vote
2 answers
2k views

How to determine if I need to patch for recent SSH exploit on Ubuntu 20.04?

OpenSSH version: OpenSSH_8.2p1 Ubuntu-4ubuntu0.11, OpenSSL 1.1.1f 31 Mar 2020 According to this Aualys blog post, that version is not affected by the SSH bug. I noticed the SSL version looked old - ...
user10841084108's user avatar
1 vote
0 answers
24 views

How to prevent ubuntu (22.04) from trying to auto connect to any new wifi network it detects?

How to prevent ubuntu (22.04) from trying to auto connect to any new wifi network it detects? I turned on the wifi, just to find out it trying to connect to a neighbor wifi network... Quite strange as ...
Gussak Thor's user avatar
0 votes
1 answer
68 views

Will this OpenSSH config provide the best security

Setting up my OpenSSH server on a Windows 10 server to be exposed to the WAN. (Up until now it has just been used on the LAN). What I am trying to achieve: When connection is from the internet, only 1 ...
M_D's user avatar
  • 469
5 votes
1 answer
721 views

What user should sshd.exe run as on Windows 10

Been running the Windows version of OpenSSH (Installed through manage optional features GUI) for a while on a Windows 10 server box. So far, SSH has only been used on the LAN, however I am working on ...
M_D's user avatar
  • 469
0 votes
0 answers
38 views

How much risk do I incur forwarding a random port to my server IFF the request comes from a specific MAC address?

I'm setting up a Nextcloud server for my own personal use, and don't really care to get a domain name or SSL certificate (maybe I'll make my own :grin:). That being said, I'd like to forward a random ...
AmagicalFishy's user avatar
0 votes
0 answers
52 views

How to Solve the Issue between Google Drive sync and Windows Security ransomware protection feature?

New Windows has a feature called Ransomware Protection in Windows Settings >> Windows Security. I use this feature to protect the folder of Google Drive. However, it doesn't go well. At the ...
Dan D.'s user avatar
  • 731
0 votes
1 answer
66 views

How do we create an SSL certificate on a website hosted on a Mac OS Sonoma system using a third-party SSL provider?

We have a website that we are hosting from a MacBook. We would like to add an SSL certificate to the website itself. Is there a way to do this, or should we just add the SSL to the whole system? We ...
AJGomez's user avatar
1 vote
3 answers
239 views

How good is the long formatting of a hard disk of windows 11, from a security perspective?

I have an old hard disk that I want to completely format. I have found online that the windows quick format deletes the partition table and labels all the data as "Available Space", but the ...
MrIzzat's user avatar
  • 11
25 votes
3 answers
6k views

How do Authenticators work?

When it came to choosing an authenticator app for GitHub and other sites, I ended up with the Sophos, because, why not. Apparently, I could have chosen the Google app or a different one. That would ...
Manngo's user avatar
  • 599
-4 votes
1 answer
108 views

Have I been hacked [closed]

Someone send me an email telling me I have been hacked.. It all seems nonsense He hacked my PC, he says, but that seems not true, as he would have used ransomware He told me my old password was my ...
user3789930's user avatar
-1 votes
1 answer
39 views

What is the concept of permissions under security tab versus sharing tab?

I have a shared folder. When I right click on it and click properties, then, Under security tab I can see list of users. Under sharing tab, under permissions I can see a list of users. It looks like ...
variable's user avatar
  • 220
0 votes
1 answer
62 views

"Security Alert" certificate in windows, finding the problematic program

You can see I have probably a hundred of these windows stacked up (given the soft shadow now a hard outline). I searched through superuser (here), tried chat GPT, no luck. I am trying to find the ...
Web and Flow's user avatar

15 30 50 per page
1
2 3 4 5
366