All Questions
4
votes
0answers
8 views
Why don't PGP and SSH keys see more widespread use as a second factor when authenticating?
One of the major up-and-coming MFA methods is U2F, which relies on an initial key exchange and challenge-response mechanism.
It's a relatively new protocol, and is only starting to see more ...
-1
votes
0answers
6 views
How to choose ECDH and ECDHE with curve more than 192 in Tomcat
I am using tomcat server, where I came across a situation where the TestSSLServer tool reports the below.
Highly appreciate your expertise in recommending a solution to the finding where I can choose ...
0
votes
0answers
11 views
Is SS7 a threat any more?
I'm reading SS7 issue on this: http://www.cyberdefensemagazine.com/ss7-flaw-allows-hackers-to-spy-on-every-conversation/
It seems to me that any phone on the world can be intercepted so the hacker ...
0
votes
0answers
7 views
Weird connection error prompts, Rootkits & MitM?
Can someone give me insight on these connection error prompts?
https://imgur.com/a/FEHJj
My internet kept reconnecting two weeks ago and I couldn't access the internet until I performed a hard reset ...
0
votes
0answers
24 views
Bizarre php file appeared in the image gallery folder of my website [duplicate]
Can anyone tell what this is or how it could possibly have made it to the image gallery folder of my website? It appears to be a bunch of variable definitions. Mind you that a period "." is the concat ...
0
votes
1answer
25 views
Vicious circle with certificates - how to trust the server cert?
I have a java app that needs to be able to communicate with a web server over ssl using an client x509 certificate (for encryption negotiation) - the private key is in the java keystore to which ...
-1
votes
0answers
10 views
Securing data passed between two sites via a browser
I need to pass some data securely from one web site to another via a browser.
A user visits site A and clicks a link there which takes him to site B; this could be just a link which would produce GET ...
0
votes
1answer
25 views
VNC via VPN in a VM
Yea you read that correctly...
What I want to achieve is the following: Have a lightweight VM running which VPNs into my work network... And then run a VNC session on my local machine that tunnels ...
-3
votes
0answers
21 views
Can somone proivde me with armv7-based or armv8-based implemented cryptography algorithms
Recently,My professor ask me to implement some cryptography algorithms(RSA,DES,AES,RC4,Rc5,etc).Although I have some knowledge about assembly language, I have no idea for these cryptography ...
4
votes
4answers
179 views
Is there any alternative beside sending One-Time-Password via SMS?
I'm working on one smaller system where it will be required to enter One-Time-Password (OTP, not to be confused with a One-Time-Pad) to download sensitive files which will be delivered to the user.
...
3
votes
1answer
35 views
Passive fingerprinting of HTTPS client
Is it possible to passively fingerprint a HTTPS client, based solely on data visible to a network eavesdropper?
In other words, consider a network monitoring box that can see all the packets (but ...
1
vote
1answer
44 views
Can Email Services download files on your computer without your permission/knowledge?
The company I work for is involved in security clearance work, and thus all company computers are monitored (files, screenshots, etc).
I am routinely logged onto my company email service with my ...
-4
votes
0answers
37 views
How to create pdf that automatically opens up a url [on hold]
I need to be able to create a pdf and send it so that when someone opens it, a website like google.com comes up. However, I need the person receiving the email to not have a choice for the url to pop ...
0
votes
1answer
26 views
What more can I do to secure my service?
I run a multiplayer gaming service that provides a server list for clients and servers. At the moment it uses an SQLite database stored locally (which is insecure in itself). I am drawing up plans to ...
0
votes
0answers
17 views
Grabbing ChaCha20 key from ram
There are various other posts which talk about grabbing a key from ram such as
http://electronics.stackexchange.com/questions/198274/storing-a-secure-key-in-an-embedded-devices-memory
How would you ...