All Questions
11
questions
1
vote
2
answers
2k
views
Security Implications from Base64 Image
I copy / pasted a data:image/png;Base64 image from a Google search into a Google Slide, before realizing it was a BASE64 image. Is there any possibility that this contains malicious code, or any way ...
4
votes
3
answers
918
views
How to assure my customer that my software is malware proof?
We are delivering an application which our customers can use on their network cluster. Now, is there any way that we can certify that the software is malware proof and is not going to spread malware ...
3
votes
0
answers
229
views
Need Security advice on virtualization and windows security
I have a little doubt about the security of my virtual machine and Windows. Can anyone please point me in right direction?
Below is my what, how and why I made my virtual machine.
Let me tell you what ...
1
vote
0
answers
159
views
How people can get infected by Malware? What are the best security practices in Windows? [closed]
Nowadays, Operating systems are providing good security mechanisms and it requires user interaction to install any software. Still, people get infected by malware. I was wondering how people get ...
0
votes
1
answer
500
views
Are the Linux community/universe repositories significantly less safe then the main repositories?
If so what makes community/universe less safe? Is there less testing or is it simply less safe because more people could put malware in them.
34
votes
1
answer
5k
views
Has malware ever been found in a package from a large Linux distribution and what is done to prevent this from occurring?
I am wondering exactly how safe are the Arch, Ubuntu, Mint and Manjaro repositories. What testing is done to ensure that a trusted user does not place a virus in a package, and how often?
3
votes
1
answer
2k
views
How to verify .plist and .kext files are legitimate?
While scouring through tons of logs generated during an audit of a Mac filesystem after a potential malware infection, and I am wondering if there are any better ways to verify that all kernel ...
4
votes
1
answer
307
views
Lowercase 'w' seen in C:\windows application paths from wmic services list
In reviewing several Windows 7 computers built from the same image (using wmic services command), I'm seeing most all the Window services paths displayed as C:\windows not C:\Windows. The 'w' is ...
5
votes
1
answer
418
views
Integrity check against package repository?
I have a Debian installed. When there are security updates, I review and install them as soon as possible and think about using automatic updates.
From time to time I want to boot from a clean boot ...
7
votes
1
answer
271
views
The Economics and White Hat Nature of NSS ExploitHub
This question is about the economic model employed by NSS with their ExpoitHub exploit marketplace (site link) and whether it jives with the white hat claims of the company. The company has made news ...
2
votes
1
answer
341
views
Detecting Key Loggers
We know that key loggers are the most effective and most annoying means of getting compromised over login id/password on the web or any application.... and your whole privacy is breached.
Is there ...