Skip to main content

Unanswered Questions

6 questions with no upvoted or accepted answers
14 votes
0 answers
307 views

Questions relating to use of hacking tools described in a non-hacking scenario

So there's a couple of questions over on the main site that have either been closed or have multiple close votes that essentially (to me) talk about using "offensive" security techniques (as opposed ...
10 votes
0 answers
194 views

Where do all the oracle 11g Qs come from?

It seems like in the last weeks, a lot of low quality questions regarding Oracle 11g are popping up where most users asking them show scriptkiddie understanding of the matter at most. Here are some ...
3 votes
0 answers
28 views

Should the race-condition tag exist? Should this question have that tag?

I recently asked Is the action of accepting a pull request on Github vulnerable to race conditions?, and while composing the question I noticed that the race-condition tag hadn't been created yet (...
1 vote
2 answers
61 views

My question was closed but I think it was on-topic (Perhaps because there is no IT asset being protected?)

This is my question: Can the IBAN of the initiator of a SEPA direct debit be faked?. I don't really mind it getting closed I just want to understand why it was closed. So I won't do the same mistake ...
1 vote
0 answers
27 views

Would this question be appropriate

I study ISO 2700x and its implications, for example how organizations must meet requirements regarding storage of "e-mail (address) lists". For example the term "e-mail list" would mean a list of ...
0 votes
0 answers
61 views

I need to clarify an answer from another post about an Audit

I got this answer to my previous question "Data stolen? What does this suspicious audit data mean?": BITS along with the TCP/IP network adapter detection and network data management protocol seem ...