Skip to main content
The 2024 Developer Survey results are live! See the results
Johnny's user avatar
Johnny's user avatar
Johnny's user avatar
Johnny
  • Member for 5 years, 9 months
  • Last seen more than a month ago
23 votes
Accepted

New CVE-2018-5407 "PortSmash vulnerablity" in Intel CPU

11 votes

How can I get rid of the MDC packet in OpenPGP?

8 votes

What can scammers see on my devices after I delete the remote desktop software?

5 votes

Could PPTP be considered a secure VPN type with idle timeout 0?

4 votes

What happens if incorrect SIM card PUK entered 10 times?

3 votes

Losing the Initialization Vector in Cipher Block Chaining

3 votes
Accepted

How can I check what scripts are in Nmap's default category (`--script=default`)?

3 votes

I found a browser extension I don't trust installed, should I worry?

2 votes

Password storage which avoids privileged insider attack

2 votes

Does Tor network encrypt the message before it reaches the first Router in Tor network?

2 votes
Accepted

I need to compute a string whose SHA256 hash matches a given prefix. How should I approach it?

2 votes
Accepted

How secure is a Mac if it passes Apple Diagnostics?

2 votes
Accepted

How can I publish text and video without revealing my identity?

2 votes

Two Factor Authentication Multiple Devices

1 vote
Accepted

Reverse Shell Exploit for SquirrelMail 1.4.22

1 vote

SRUM (system resource usage monitor) forensics - Windows server?

0 votes

Potential router malware? Receiving "Access Denied" and other weird blocks from various websites

0 votes
Accepted

Does compiling a program in Visual Studio (Windows Forms, VB.NET) leave a MAC address in the executable?