All Questions

1 vote
1 answer
63 views

Clarify on why this wasn't a hardening question?

Could I get some clarification of scope for security.stackexchange. I'd though my question was on topic as a "hardening" question, as mentioned in the help. I don't quite understand what ...
Philip Couling's user avatar
3 votes
1 answer
119 views

Is this a security question or a networking question?

Possible to determine who on the Internet is resetting (RST) my TCP connection? To me, this is a pure networking question. "How to find where in the traffic flow the RST is happening" is ...
schroeder's user avatar
  • 131k
2 votes
1 answer
122 views

Can I ask for research experiment participants here?

I'm working on my masters thesis and will be looking for participants to attempt to hack a server and bypass a new protocol I've invented. Is it alright to advertise my research here?
Jonathon Anderson's user avatar
0 votes
1 answer
161 views

My question was labeled Off-Topic. Why?

I have a question about my Information Security Stack Exchange post: How can I go about reporting a data breach in my private network without compromising my personal/private network data I don't ...
Joel Vázquez's user avatar
-2 votes
1 answer
139 views

Why is the question about suddent large traffic on a GitHub repo off-topic?

Question on question: What would be the reasons for a GitHub repo suddenly get cloned by a huge amount of times in a short period of time? The question is closed as off-topic. From What topics can I ...
Ooker's user avatar
  • 1,591
3 votes
2 answers
316 views

Middle Sidebar Advertising

As you all know, advertising is an important source of revenue for Stack Overflow and it helps us support all the sites across the Stack Exchange Network and the resources that go into maintaining and ...
Rosie's user avatar
  • 101
2 votes
1 answer
145 views

Should I add a disclaimer to my answers?

On some questions related to hacking, I'm not 100% sure whether the person has permission to do it or not. In those cases, does it make sense to add a disclaimer to my answers?
UndercoverDog's user avatar
1 vote
0 answers
252 views

Tag for "group chat" encryption and group key exchange protocols

I'm proposing a new tag to cover the more specific key exchange and encryption amongst groups. I'm thinking along the lines of group-chat : an argument for this choice is that the concept would be ...
brynk's user avatar
  • 1,137
2 votes
0 answers
147 views

2022: a year in moderation

As we say goodbye to the old year and welcome the new one, we have a tradition of sharing moderation stats for the preceding calendar year. As most of you here are aware, sites on the Stack Exchange ...
JNat's user avatar
  • 101
-1 votes
1 answer
208 views

How to reword to make it on topic?

This question got closed for being "off topic". The Help Center specifically says "security tools" are in scope. I don't understand why asking about how to use a tool is out of ...
Jackson Pfeffer's user avatar
0 votes
1 answer
172 views

OK to ask if a particuar app store's vetting is sufficient for a high risk app under non-targeted conditions?

I want to ask whether it is safe to install an app from a high-risk provider. Googling has shown that Apple's app store does vetting of code to prevent stealing of information from personal ...
user2153235's user avatar
1 vote
1 answer
143 views

Would this be the right place to ask for hint/guidance regarding InfoSec ctfs/challenges?

I am starting out in bug bounty training and have some need for guidance and hints towards solving some challenges and ctfs, as well as explanations on what is actually happening both in challenges I'...
Alvaro's user avatar
  • 11
2 votes
1 answer
130 views

What should one do when one finds an answer with an example that could create a security issue?

As I'm working on a tool to manage my firewalls, I stumbled on this answer: Block SYN,ACK response with iptables which include two lines of code like so: # iptables -A INPUT -p tcp -m state --state ...
Alexis Wilke's user avatar
  • 1,017
2 votes
0 answers
164 views

Can we make the 2fa tag a synonym of multi-factor?

I've been trying to kill the 2fa tag for a while, but it keeps comming back from the dead. We already have the tag multi-factor and I see no meaningful distinction that would be upheld by people ...
Anders's user avatar
  • 65.7k
2 votes
1 answer
280 views

Why was my answer to this question about Adobe Illustrator files deleted?

I'm extremely confused. I've provided an extensive explanation and answer to the question "Can .ai files (Adobe Illustrator) be malicious?", yet it was deleted on some unclear grounds. Why ...
Artem S. Tashkinov's user avatar

15 30 50 per page
1
2
3 4 5
78