Skip to main content

All Questions

Tagged with
0 votes
0 answers
46 views

How to Solve the Issue between Google Drive sync and Windows Security ransomware protection feature?

New Windows has a feature called Ransomware Protection in Windows Settings >> Windows Security. I use this feature to protect the folder of Google Drive. However, it doesn't go well. At the ...
Dan D.'s user avatar
  • 731
1 vote
3 answers
236 views

How good is the long formatting of a hard disk of windows 11, from a security perspective?

I have an old hard disk that I want to completely format. I have found online that the windows quick format deletes the partition table and labels all the data as "Available Space", but the ...
MrIzzat's user avatar
  • 11
-1 votes
1 answer
37 views

What is the concept of permissions under security tab versus sharing tab?

I have a shared folder. When I right click on it and click properties, then, Under security tab I can see list of users. Under sharing tab, under permissions I can see a list of users. It looks like ...
variable's user avatar
  • 220
0 votes
1 answer
60 views

"Security Alert" certificate in windows, finding the problematic program

You can see I have probably a hundred of these windows stacked up (given the soft shadow now a hard outline). I searched through superuser (here), tried chat GPT, no luck. I am trying to find the ...
Web and Flow's user avatar
0 votes
1 answer
27 views

How to manage permissions for IIS sites with 'Authenticated Users' group

Have multiple sites (2) hosted on IIS with PHP. Each site runs under its own application pool, therefore each instance of w3wp.exe (IIS Worker Process) and php-cgi.exe runs under the respective ...
M_D's user avatar
  • 469
0 votes
1 answer
43 views

Can a directory junction in a trusted folder be a trusted mount point in Windows 11?

For example, I have a home directory c:\users\me. Inside that, I have c:\users\me\Dropbox. I also have a junction c:\users\me\Cloud -> c:\users\me\Dropbox to indicate that my current Cloud provider ...
Ammo Goettsch's user avatar
2 votes
1 answer
49 views

How to prevent programs from reading Chrome data?

I found a program on Github that can easily extract data from the installed browsers with just one command. This includes, localstorage, passwords etc. It doesn't need administrator access. Is there a ...
binary10's user avatar
0 votes
0 answers
72 views

Exclude subfolder from protected folders

Is there a way to exclude some subfolders from protected folders in Windows Security? I added my One Drive folder as a protected folder, but I would like to exclude some subfolders from protection - ...
NewPhpBoy's user avatar
1 vote
1 answer
315 views

How are (NetBIOS?) names being resolved on my network?

Firstly, i have little understanding of Windows Network Discovery, and how NetBIOS operates. I don't like it, and i try to ignore it. I have a server on my LAN, which (among other things) is acting as ...
M_D's user avatar
  • 469
0 votes
0 answers
123 views

Share folder structure for projects

I am trying to figure out a way to set up a share drive that will allow a manufacturing shop to restrict access depending whether they work in the office or on the shop floor. The way they want to do ...
Theodore Cooper's user avatar
0 votes
0 answers
80 views

Selective TLS connection fail

I have a VB.NET application that connects to a remote server, which I have no authority whatsoever, via a username/password, retrieves some data and populates a local database. Lately the application ...
user10191234's user avatar
0 votes
1 answer
147 views

Can't unlock folders with "Any Folder Password Lock" software

I'm using a software called Any Folder Password Lock and it's not unlocking my folder anymore.. I tried to uninstall it but the folder is still locked and I'm pretty sure what password I use to lock ...
Abdulrahman Zayed's user avatar
0 votes
1 answer
115 views

Can USB drives still be read or written to after hitting "Eject" in Windows 11?

After hitting "Eject" in Windows explorer, without removing the USB stick, can it still be read or written to by other software? If I leave it plugged in is there any risk of other software ...
Taylor Swift's user avatar
2 votes
1 answer
745 views

How to create CA + 2 Certificates *with XCA* - For Host-to-Host IPSec authentication (No AD)

(This is a question about using XCA, not openssl, and this is my motivation) I created CA, Server, and Client certificates: Within XCA, do I need to create these certificates differently? Does each ...
Amit's user avatar
  • 260
0 votes
1 answer
315 views

Supplemental WDAC policy Doesn't Override Block Rule from Base WDAC Policy (Microsoft Recommended Block Rules)

I'm working on creating a Windows Defender Application Control (WDAC) supplemental policy which supplements a base policy. The base policy is merged with the Microsoft Recommended Block Rules. This ...
TheCyberWarden's user avatar

15 30 50 per page
1
2 3 4 5
51