Stack Exchange Network

Stack Exchange network consists of 175 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.

Visit Stack Exchange

Questions tagged [security]

The protection of computer systems and information from threats such as theft or data destruction.

0
votes
0answers
5 views

Trying to Install Metron with Vagrant 2.2.4. Receiving following error on vagrant up. Tried many VB patches. Want suitable VB version to resolve

The guest machine entered an invalid state while waiting for it to boot. Valid states are 'starting, running'. The machine is in the 'gurumeditation' state. Please verify everything is configured ...
0
votes
0answers
8 views

Generating RSA keys for a user using node package

i want to know if the node package "generate-rsa-keypair" it's work the same like openssh generate key or not ? Actually,I'm using Node.js as a server side language and I would like to generate an RSA ...
0
votes
0answers
3 views

How to authenticate to Spring security / Oauth using USB token stick

I have a Java desktop application that communicates with a Spring boot back end. I would like to only be able to do authenticated calls when the USB token is plugged. I would like to use the token in ...
1
vote
1answer
32 views

How to run game that needs administrator privilege as a standard user?

I have a Windows 7 32 bit PC. Since my small kids use it, to prevent them from changing the Registry or anything dangerous like installing games containing malware, I've created a "Standard user" for ...
-1
votes
0answers
9 views

SSRS Custom Security Extension Loses Cookie on Search

I have built a custom security extension for SSRS to implement forms authentication in SQL Server 2017. It works as designed as long as the authenticated user navigates through the reports and ...
0
votes
1answer
34 views

Is having all wireless devices (both visitors and home users) use a guest wireless SSID a bad idea?

I'm reluctant to have any wireless devices with visibility into my home LAN systems (PCs / home servers). So I was thinking of having all wireless devices use the guest SSID. Is this a bad idea? I don'...
0
votes
0answers
12 views

RDGateway Password Reset not following Password Policy

I have implemented password reset page in RDgateway and the password reset page is enabled, however the password policy followed is not that which is setup in security policy. The length of password ...
0
votes
0answers
17 views

Deny wrappers wherether they would be [on hold]

A recommendation is required how to prevent the execution of commands other than those in /bin /usr/bin /sbin /usr/sbin /usr/local/sbin paths. rbash does not prevent execution of renamed wrappers, but ...
-1
votes
0answers
21 views

Is it secure to pass sudo password with SSL(https)? [on hold]

I'm developing a python web server running on ubuntu, that needs to run commands or files (that is not verified) with sudo. I've thought for solutions: Running a web server with sudo permission: ...
0
votes
0answers
24 views

How Secure is SFTP [duplicate]

I appreciate the encryption key is almost impossible to break. But if server 1 is connecting to server 2. Presumably once the connection is initiated from server 1 to server 2 - a public key must be ...
0
votes
0answers
16 views

EV code signing in cloud

We use EV code signing for our Windows Desktop app, so that SmartScreen treats it as trusted. That's all good, except the signature process requires hardware token to be plugged-in in the system where ...
0
votes
0answers
28 views

Windows 10 Service “Log On As” User Gives Error “Access Denied”

I am trying to start a service automatically but log on with a specific credential. Here is an example: The specific service does NOT matter, as the problem happens with any service, namely that I ...
0
votes
0answers
6 views

Bitlocker - encrypt all partititions

I would like to ask if it is possible to encrypt all partitions with one key stored in AD. We use it now only for C drive with system, but we would like to extend it for the rest of partitions but ...
0
votes
2answers
62 views

Securing the file system of an IoT device [closed]

I am working on an IoT device network for my job and I need to secure the devices on the network. I have done some basic steps like preventing any login on the root user and using key pairs to connect ...
0
votes
1answer
44 views

Should my package have its own user by default?

When I create a package that should run a daemon on the user's system (or on an embedded system), is it good security practice to create a user and/or group for that package at install time? I know ...

15 30 50 per page