Skip to main content

All Questions

Tagged with
1 vote
2 answers
2k views

Security Implications from Base64 Image

I copy / pasted a data:image/png;Base64 image from a Google search into a Google Slide, before realizing it was a BASE64 image. Is there any possibility that this contains malicious code, or any way ...
Questionstoask's user avatar
4 votes
3 answers
918 views

How to assure my customer that my software is malware proof?

We are delivering an application which our customers can use on their network cluster. Now, is there any way that we can certify that the software is malware proof and is not going to spread malware ...
Lost's user avatar
  • 405
3 votes
0 answers
229 views

Need Security advice on virtualization and windows security

I have a little doubt about the security of my virtual machine and Windows. Can anyone please point me in right direction? Below is my what, how and why I made my virtual machine. Let me tell you what ...
user3526312's user avatar
1 vote
0 answers
159 views

How people can get infected by Malware? What are the best security practices in Windows? [closed]

Nowadays, Operating systems are providing good security mechanisms and it requires user interaction to install any software. Still, people get infected by malware. I was wondering how people get ...
rise of a phoenix's user avatar
0 votes
1 answer
500 views

Are the Linux community/universe repositories significantly less safe then the main repositories?

If so what makes community/universe less safe? Is there less testing or is it simply less safe because more people could put malware in them.
user's user avatar
  • 829
34 votes
1 answer
5k views

Has malware ever been found in a package from a large Linux distribution and what is done to prevent this from occurring?

I am wondering exactly how safe are the Arch, Ubuntu, Mint and Manjaro repositories. What testing is done to ensure that a trusted user does not place a virus in a package, and how often?
user's user avatar
  • 829
3 votes
1 answer
2k views

How to verify .plist and .kext files are legitimate?

While scouring through tons of logs generated during an audit of a Mac filesystem after a potential malware infection, and I am wondering if there are any better ways to verify that all kernel ...
user83426's user avatar
  • 310
4 votes
1 answer
307 views

Lowercase 'w' seen in C:\windows application paths from wmic services list

In reviewing several Windows 7 computers built from the same image (using wmic services command), I'm seeing most all the Window services paths displayed as C:\windows not C:\Windows. The 'w' is ...
templets's user avatar
5 votes
1 answer
418 views

Integrity check against package repository?

I have a Debian installed. When there are security updates, I review and install them as soon as possible and think about using automatic updates. From time to time I want to boot from a clean boot ...
Lonelyisland's user avatar
7 votes
1 answer
271 views

The Economics and White Hat Nature of NSS ExploitHub

This question is about the economic model employed by NSS with their ExpoitHub exploit marketplace (site link) and whether it jives with the white hat claims of the company. The company has made news ...
zedman9991's user avatar
  • 3,437
2 votes
1 answer
341 views

Detecting Key Loggers

We know that key loggers are the most effective and most annoying means of getting compromised over login id/password on the web or any application.... and your whole privacy is breached. Is there ...
Legolas's user avatar
  • 563