Skip to main content
leeand00's user avatar
leeand00's user avatar
leeand00's user avatar
leeand00
  • Member for 12 years, 7 months
  • Last seen more than a month ago
52 votes
4 answers
56k views

Should I be using ECDSA keys instead of RSA for SSH?

14 votes
2 answers
3k views

Are SHA-2 certificates considered obsolete, or current?

5 votes
1 answer
4k views

Does Firefox use OCSP?

4 votes
3 answers
777 views

What can be done to secure passwords that might be stored in plain text or hashed inside a git repository?

4 votes
1 answer
157 views

Does using creating a seprate firefox profile cause a seprate security context protect against XSS and DNS Re-binding?

4 votes
1 answer
307 views

Looking for SSH key management tricks that apply to a large fleet of machines to reduce the 'trust of first use' attack surface?

4 votes
1 answer
480 views

Is there a way to run a downloaded powershell script as admin without setting a global ExecutionPolicy bypass?

3 votes
1 answer
4k views

Should a backup server be on a separate subnet / vlan from other machines on the network?

3 votes
1 answer
543 views

Is binding all private services to the 127.0.0.1 address and then accessing them via SSH using an RSA key pair of 4096 bits secure?

3 votes
3 answers
7k views

Should I use more than 2048 bits in my SSH-2 RSA Key?

3 votes
2 answers
1k views

What agency digitally signed Cryptowall 2.0 so that it can run without being detected?

2 votes
2 answers
265 views

In what situations should a node ping/not ping?

2 votes
3 answers
2k views

Are there any security hazards to installing Ubutnu for Windows 10?

2 votes
2 answers
909 views

If I turn off Windows Defender Credential Manager off in Windows 10 so I can run a virtual machine in Virtual Box, is that a bad idea?

1 vote
1 answer
237 views

How do you lock down a users access to ODBC settings in Windows 10? [closed]

1 vote
1 answer
168 views

How does one tighten up their git repo security for Powershell?

1 vote
0 answers
71 views

In CiscoAMP can one determine how long the scan of a file took based on the times between scans in history.db?

1 vote
1 answer
5k views

Is there a way to prevent changing the MAC address on a Windows machine?

1 vote
1 answer
2k views

How do I verify that an ssh public/private keypair go together, is it different for openssl and ssh-key generated keys?

1 vote
1 answer
226 views

Best Practices for exporting sensitive database data and transforming it whilist keeping it encrypted?

1 vote
0 answers
792 views

How can I safely use Get-Credential to obtain a username and password for a set period of time for use as command line arguments?

1 vote
0 answers
91 views

Are the interactive methods of credential gathering listed here actually secure, since they dont store the credentials on disk?

1 vote
1 answer
198 views

Find the Encryption Key (used for network encryption) assuming a Trust Chain is being used on Windows?

1 vote
2 answers
363 views

Generating a Certificate Signing Request for an Apache webserver on a sub domain?

1 vote
1 answer
520 views

Is it possible to filter internet access on a mobile phone with a 3/4G connection with a proxy server?

1 vote
1 answer
505 views

Is it possible to lock down the http / https proxy settings on an iPhone?

1 vote
1 answer
192 views

Is it possible to lock down the http / https proxy settings on an Android phone?

1 vote
1 answer
142 views

Is it possible to lock down the http / https proxy settings on a Windows Phone?

1 vote
0 answers
149 views

Making My Cache Work and Not Theirs: Blacklist for Blocking Caching Sites with Squidguard?

1 vote
2 answers
254 views

What is the niche that Kerberos authentication fills called?