Recent facts about Virtualstation

Fetched in 1 ms
  • I am interested what features VMWare uses to protect passwords inside the virtual machine.

  • We want to study for the CEH program and have downloaded 12 DVDs that 6 DVDs are software key-loggers, Trojans, etc. that are all detected by antivirus. This prevents us from examining them and learni...

  • Web servers such as Apache and nginx support virtual hosting. To the users of websites on a shared server, they will not know that another websites exists on the same server. I have been wondering for...

  • My company's set-up involves a single AP (TPlink) that is configured to authenticate clients using RADIUS. All works well, but: on a regular WPA/WPA2 network, once you have the PSK, you are able to de...

  • I'm making a REST-API and it's straight forward to do BASIC auth login. Then let HTTPS secure the connection so the password is protected when the api is used. Can this be considered secure?

  • I'm trying to brainstorm a security scheme for the problem of verifying server software integrity. The domain of this problem is Game Servers built on Valve's Source Dedicated Servers. These servers a...

  • I'm looking for hints about secure linux desktops. Securing servers is no problem. Most recent Software Updates, run only the services required etc. But what about desktops? I'm thinking about details...

  • When I was a kid, I want to become a Malware Analyst and work in a Antivirus company. At that time, I love to try out different antivirus solutions and did a research project on Computer virus/antivir...

  • Given a one-time password generator that is time-based (such as Google Authenticator), how many instances of (time, PIN) pairs would one need to significantly weaken the algorithm to a point where one...

  • Recently I have been getting more and more interested in the security (privacy and anonymity) issues of my online life. Not that I have anything to hide, or that what I do online is so interesting to ...

  • I've read that code is formally verified by constructing a mathematical model of the code, and then a formal proof is provided to demonstrate that this model meets certain requirements. How does forma...

  • Passwords of end Users are stored in Database which is encrypted (using one way hash like MD5). Apart from me, there are 'other' people belonging to other teams who have access to Database which means...

  • The email address I used to create Skype profile has been disabled and I can't get it back. Unfortunately, I don't remember the Skype password now. As the password is auto saved in my local machine I...

  • Essentially my question is, why ASLR doesn't randomize text, bss and data regions of the process? Also in the newer version of kernels (such as Linux kernel version 3.x) along with process base, libra...

  • I have root login disabled in SSH and I want to be able to eliminate the possibility of a sudo user editing the /etc/ssh/sshd_config file and enabling root ssh login. Is this possible?

  • What is a recommended way of handling CRLs in long-term electronic signatures (specifically the CAdES-A)? The problem I see is in that CRLs are not protected against modification (they are plain text...

  • Foreign MRT.exe? user2738698

    I was managing my firewall using AVG and I noticed this was allowed: I have north american locale, and sometimes Japanese locality(?), and that is not Japanese. It is getting through my firewall, ...

  • I have just now got 20 of my e-commerce websites scanned and certified by Comodo. I will be submitting them to my banks as well to prove that I am PCI compliant. But is there any regulation on who c...

  • Can I safely assume that my RAM never can be accessed by another user on e.g. EC2 or Digital Ocean, if we suppose that I trust my provider and we don't consider possible bugs (such as Heartbleed) in m...

  • How can I secure my notebook with highly sensitive information stored in a spreadsheet. I am keeping the following options in mind: Password protect & encrypt BIOS Full disk encryption Password...