All Questions
1,156
questions
1
vote
1
answer
63
views
Clarify on why this wasn't a hardening question?
Could I get some clarification of scope for security.stackexchange.
I'd though my question was on topic as a "hardening" question, as mentioned in the help.
I don't quite understand what ...
3
votes
1
answer
119
views
Is this a security question or a networking question?
Possible to determine who on the Internet is resetting (RST) my TCP connection?
To me, this is a pure networking question. "How to find where in the traffic flow the RST is happening" is ...
2
votes
1
answer
122
views
Can I ask for research experiment participants here?
I'm working on my masters thesis and will be looking for participants to attempt to hack a server and bypass a new protocol I've invented. Is it alright to advertise my research here?
0
votes
1
answer
161
views
My question was labeled Off-Topic. Why?
I have a question about my Information Security Stack Exchange post: How can I go about reporting a data breach in my private network without compromising my personal/private network data
I don't ...
-2
votes
1
answer
139
views
Why is the question about suddent large traffic on a GitHub repo off-topic?
Question on question: What would be the reasons for a GitHub repo suddenly get cloned by a huge amount of times in a short period of time?
The question is closed as off-topic. From What topics can I ...
3
votes
2
answers
316
views
Middle Sidebar Advertising
As you all know, advertising is an important source of revenue for Stack Overflow and it helps us support all the sites across the Stack Exchange Network and the resources that go into maintaining and ...
2
votes
1
answer
145
views
Should I add a disclaimer to my answers?
On some questions related to hacking, I'm not 100% sure whether the person has permission to do it or not.
In those cases, does it make sense to add a disclaimer to my answers?
1
vote
0
answers
252
views
Tag for "group chat" encryption and group key exchange protocols
I'm proposing a new tag to cover the more specific key exchange and encryption amongst groups.
I'm thinking along the lines of group-chat : an argument for this choice is that the concept would be ...
2
votes
0
answers
147
views
2022: a year in moderation
As we say goodbye to the old year and welcome the new one, we have a tradition of sharing moderation stats for the preceding calendar year.
As most of you here are aware, sites on the Stack Exchange ...
-1
votes
1
answer
208
views
How to reword to make it on topic?
This question got closed for being "off topic". The Help Center specifically says "security tools" are in scope. I don't understand why asking about how to use a tool is out of ...
0
votes
1
answer
172
views
OK to ask if a particuar app store's vetting is sufficient for a high risk app under non-targeted conditions?
I want to ask whether it is safe to install an app from a high-risk provider. Googling has shown that Apple's app store does vetting of code to prevent stealing of information from personal ...
1
vote
1
answer
143
views
Would this be the right place to ask for hint/guidance regarding InfoSec ctfs/challenges?
I am starting out in bug bounty training and have some need for guidance and hints towards solving some challenges and ctfs, as well as explanations on what is actually happening both in challenges I'...
2
votes
1
answer
130
views
What should one do when one finds an answer with an example that could create a security issue?
As I'm working on a tool to manage my firewalls, I stumbled on this answer:
Block SYN,ACK response with iptables
which include two lines of code like so:
# iptables -A INPUT -p tcp -m state --state ...
2
votes
0
answers
164
views
Can we make the 2fa tag a synonym of multi-factor?
I've been trying to kill the 2fa tag for a while, but it keeps comming back from the dead. We already have the tag multi-factor and I see no meaningful distinction that would be upheld by people ...
2
votes
1
answer
280
views
Why was my answer to this question about Adobe Illustrator files deleted?
I'm extremely confused.
I've provided an extensive explanation and answer to the question "Can .ai files (Adobe Illustrator) be malicious?", yet it was deleted on some unclear grounds.
Why ...