Stack Exchange Network

Stack Exchange network consists of 174 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.

Visit Stack Exchange

Questions tagged [security]

The protection of computer systems and information from threats such as theft or data destruction.

0
votes
0answers
4 views

how use bitlocker/manage-bde with computer name?

I'm using bitlocker with SID protections to encrypt the usb stick of the employess of my company. Basically , I'm linking the key to their AD account with this command: manage-bde -on d: -used ...
0
votes
0answers
20 views

Why is a stored Wi-Fi password on Android/iOS inaccesible without root access? [on hold]

If I've saved a Wi-Fi password on my laptop, it's trivial to bring up the password (if I've forgotten it or want to send it to someone else). But on Android (and I believe iOS is similar), it's stored ...
-3
votes
0answers
44 views

why don't viruses just attack the FAT or MFT to delete data or Windows? [on hold]

I have seen some of the virus attacks and what I have seen is that it takes longer for viruses or any harmful piece of code to delete data if a lot of data is in the hard drive. So why does the virus ...
0
votes
0answers
18 views

Does Ap Isolation protect from Middle Man Attacks?

So the network I am connected to has the feature ap isolation and I do understand the meaning of ap isolation, is in summary the imposibility for any device to communicate with some other with the ...
0
votes
1answer
29 views

What is the difference between Secure Boot and Verified Boot?

As I understand it, both "Secure Boot" and "Verified Boot" work in the same way. In particular: on boot, the first thing that runs is code found in ROM. This ensures that it can be "trusted" the ROM ...
6
votes
5answers
897 views

How safely does reinstalling Windows wipe old data?

I've got a set of computers that have had privileged information on that I want to be able to re-use. If I used a Windows boot drive to re-install Windows, how sufficient would that be towards keeping ...
0
votes
0answers
28 views

Tracing a fake email back to the sender [on hold]

I received an email from a fake address from someone pretending to be my ex. I'm currently being stalked and am sure it was from my stalker but obviously need to be able to prove it. Does anyone know ...
0
votes
0answers
4 views

sudo/pkexec vs sandbox: Differences & Pros/Cons

I am looking at running Jitsi on Debian. For security reasons, I want to isolate Jitsi from the rest of the system. I could use a VM, but I want a lighter solution. So I looked at sudo/pkexec vs. ...
0
votes
0answers
11 views

Adressbar not readable in IE11 when tls security when using non-trusted tls cert

When targeting a site with self signed tls cert, my adressbar has a red background and the adress itself is shown in light gray, so that it's very hard to read the url or its parameters: Background ...
0
votes
0answers
19 views

How can I tell my last successful logon time and # of failures since last logon as a standard user on a stand-alone system without reducing security?

I want to report, via a popup, when the user's last successful logon time and the number of failures since the last successful logon time were. I'm aware that there is a policy setting to perform ...
0
votes
1answer
16 views

Which privileges/settings are responsible so standard user can start a service?

My code works fine on one computer but the same code generates error code 5 (access denied) on another computer. Essentially ::OpenService() call fails because of the flag SERVICE_START because the ...
4
votes
1answer
50 views

Buying used computer - any identifying hardare specs sent when surfing web?

this is one of those "Things I should know and was afraid to ask" questions. I'm considering buying a used laptop for the first time - and I had a thought - even if I wipe the hard drive and re-...
0
votes
1answer
410 views

taskhostw.exe asks for webcam usage

ESET prompted a window that taskhostw.exe wants to access the webcam on my laptop. The exe is from system32. I turned off camera access before but it seems like a system update turned it back on ...
0
votes
0answers
34 views

Should I log out from services while closing my own private environment?

What is the difference if I have private tab in firefox browser and I do not log out: before I close a browser before log out and close a computer at all. Is there any cache in my LAN which allow to ...
0
votes
0answers
15 views

Asp.Net app won't make external calls

Given: An ASP.NET application published to IIS on a server on port 81. The app calls external data provider over http (call), using a proxy. The app runs fine locally, but it fails on a server. When ...

15 30 50 per page