Skip to main content

Questions tagged [file-system]

A file system is a way of organizing information on a storage device like a computer hard drive.

1 vote
0 answers
69 views

How to use one of Microsoft's new computers without leaking information?

Let's say I am interested in using one of Microsoft's new computers but I have concerns over the massive amount of data, personal behavior, and whatnot being consumed by the machine. Microsoft claims ...
Kevin Connors's user avatar
1 vote
0 answers
51 views

How to create read-only pendrive (no availability of coping, deleting or overwriting) [duplicate]

I want to create pendrive or external HDD, that is read only. To be precise - I want to be open to read files on it (documents or video files), but to prevent files from being copied off disk. As I ...
Herman Pompka's user avatar
1 vote
0 answers
72 views

Best collaboration and file sharing platform across multiple organizations (and IT ecosystems) [closed]

Four discrete organizations wish to share calendars, files, and folders for collaboration purposes on multi-year projects (including regular online and in-person events). Each one has their own ...
Bashi's user avatar
  • 11
3 votes
1 answer
453 views

How to properly sanitise a file name

I am to generate a file name that will be used for a ZIP file sent back to the user from a web app. I have no idea what OS that file will ultimately be saved to so I have to come up with a way to ...
Stephane's user avatar
  • 18.7k
0 votes
0 answers
284 views

Outdoor backup: gocryptfs --init --reverse: alway same .diriv in 1st level directory

Intro Trying to send encrypted backup of in productions filesystems, I was interested by the ability of using gocryptfs in reverse mode! The idea is to use gocryptfs --reverse from any existing (...
F. Hauri  - Give Up GitHub's user avatar
1 vote
0 answers
103 views

File System with SGX assistance threat model

I am studying some published papers that demonstrate how I can a secure file system been implemented with the assistance of Intel SGX. However, in each one of these papers, the threat model is not ...
johnkaramp's user avatar
0 votes
1 answer
125 views

Can I upload files to a certain website to see exactly what code they contain and what they do (heuristics)?

I want to upload files somewhere to see exactly what their behaviour is, but I’m not sure how. One of them is an EFI file. Does anyone know some website or method, like on a virtual machine, to check ...
pej 's user avatar
  • 1
1 vote
0 answers
511 views

API hooking with Microsoft Detours

I want to hook certain API calls, e.g. CreateFile (or NtCreateFile if I hook ntdll.dll), but there are some issues. I can use several methods to achieve this goal, e.g. DLL injection, Inline hooking ...
Moooz's user avatar
  • 45
1 vote
1 answer
293 views

How does an attacker modify local files when I access them in Chrome?

I have a trusted html file containing a script that handles sensitive information. When I open it in Chrome 108 on Android, it says: What is this about? The above warning seems to appear ...
personal_cloud's user avatar
1 vote
1 answer
362 views

How can we restrict users from copying "non-allowed" file types from USB?

We blocked USB ports on most of the devices using Intune. However, a subset of users requires USB access due to their job scope which requires them to copy images from their cameras to their PCs. Is ...
TDK's user avatar
  • 11
1 vote
0 answers
512 views

Restrict node.js filesystem access

I have a Node.js app which has a lot of npm-dependencies, running on Linux (Centos) machine. When Node starts, the script has access to the files outside its directory (as least by default), so ...
Oleg's user avatar
  • 309
1 vote
1 answer
411 views

Why does some Ransomware encrypt also the file header and trailer?

Some time ago I read an article that mentioned that it is possible for some ransomware to change the magic numbers of a file (that makes sense). However, the authors claimed that their method was ...
Moooz's user avatar
  • 45
2 votes
1 answer
272 views

Linux access control policies sudoers

I'm learning about linux hardening and I'm creating a sudoers file. My idea is to separate things. There will be a user to see log files, another that can sudo to manage system processes, another for ...
guu1's user avatar
  • 21
22 votes
2 answers
4k views

What metadata from the Linux file system is in my uploaded photos?

Before uploading a photo or image to a forum, I may typically strip the metadata to remove identifying material with exiftool. The thing is, the Linux file system itself seems to leave some metadata ...
cardamom's user avatar
  • 379
0 votes
0 answers
100 views

Shared computer's disc space mysteriously filling up - worried about illegal content

I'm not an Information Security professional, just a worried layperson. A few years ago, when I was logged into my own account on a shared laptop, the disc space mysteriously kept filling up. I ...
Notmycupoftea's user avatar

15 30 50 per page
1
2 3 4 5
14