Skip to main content
R1W's user avatar
R1W's user avatar
R1W's user avatar
R1W
  • Member for 7 years, 11 months
  • Last seen more than a week ago
  • Germany
70 votes
2 answers
22k views

How can ISPs handle DDoS attacks?

64 votes
2 answers
13k views

Does removing a GUI from a server make it less vulnerable?

4 votes
1 answer
7k views

Difference between Run and Exploit

3 votes
2 answers
2k views

How to identify L2 devices in a Wide Area Network?

1 vote
2 answers
1k views

How to analyze malware to find out where keylogger sent data?

1 vote
1 answer
323 views

The role of Machine Learning In Cybersecurity Defense [closed]

1 vote
1 answer
2k views

Difference between system uptime and last boot time in windows

0 votes
3 answers
803 views

Why is programming skill required for cyber security job positions?

0 votes
1 answer
139 views

How can Linux service installation page create an attack surface?

0 votes
3 answers
2k views

Is It More Secure to Use Firewalls from Two Different Vendors?

0 votes
1 answer
739 views

Do vendors put backdoors on network devices?

0 votes
1 answer
322 views

What Are the Algorithm and techniques of IP Traceback?

-1 votes
5 answers
509 views

Is encrypting data once enough? [closed]

-2 votes
2 answers
355 views

Why is DDOS is one of the most common Cyber-Attack? [closed]

-3 votes
2 answers
541 views

Do cookies violate privacy and should not be used? [duplicate]

-3 votes
1 answer
293 views

How should we deal with ransomware after it did happend? [closed]

-3 votes
1 answer
293 views

Risks of using free proxy and VPN services [closed]

-4 votes
1 answer
215 views

TCP protocol Denial-of-service attack [closed]