Recent facts about Virtualstation

Fetched in 0 ms
  • I would like to give a daemon-style process (i.e. no user interaction) access to a shared secret key so that it can access a shared, encrypted data file. User applications accessing the same encrypted...

  • (Edited & added more information at the bottom of this question) I've been tasked with "testing" a client's Linux web servers, running cPanel (which they own and mostly manage, until they come to...

  • My company just got a worm. The specific one is beside the point, but I linked a couple pages that I think describe the worm / virus below. We're getting lots of emails to Outlook asking us to open do...

  • Is it possible for an attacker to restore passwords or encryption keys that one has used in a virtual machine the same way like restoring keys that have been used in a standard system applying a boot...

  • Firewall in virtual machine WhimsicalWombat

    I'm putting my server to use as a file server and a firewall. I'm looking at KVM or Xen VM setup where file server and firewall get their own VMs and host is just supplying the hardware (so Xen way, I...

  • I am evaluating an internal 2 factor authentication implementation in an organization. The system designer wants to remove regular user names and passwords from all user workstations such that each us...

  • Reading a couple questions and answers here recently got me to thinking. Wireless keyboards run the inherent risk of exposing their data due to the relatively broad transmission range, and the ease w...

  • I'd like to measure queuing time, similar to what they're doing in Finland. Instead of detecting bluetooth (which is disabled in most phones) I thought of detecting EDGE/3G. I'd like to log the follo...

  • I've signed on to help a department move buildings and upgrade their dated infrastructure. This department has about 40 employees, 25 desktops, an old Novell server, and a handful of laboratory proces...

  • Is running an OpenBSD** using QEMU on an OpenBSD safer then running just natively an OpenBSD? ** = only used for apache + scp + ssh I'm thinking about running the OS/webserver in QEMU because then I...

  • Using ettercap and ARP poisoning, I was able to eavesdrop on other connections, but suddenly I was unable to make any connection to the Internet. To restore Internet connectivity, I had to restart my...

  • I am considering deploying mod_security as an addition to our web infrastructure. I am worried about the increased load however as these servers get a lot of hits. I am considering using IPS's such ...

  • I am currently helping my teacher create a curriculum around IT Security because it isn't currently implemented. Some previous question had decent responses but I was wondering if there was more. My ...

  • A pendrive with some sensitive files were connected to a Windows XP computer. I'll have access to that computer, now it's turned off. How can I analyze if some or all files from my pendrive were copi...

  • I'm building a secure system which stores messages on a server in a Postgresql database. The messages are stored encrypted with PHP's openssl_encrypt() function with the AES-256-CBC method. At the m...

  • Are there ways to monitor and check for network monitoring like WireShark? Or would it just be more ideal to ensure every application uses SSL to ensure no employee or anyone could packet sniff chats...

  • I see a lot of similar question but my is different. I had done a lot of challenges like Kioptrix and De-ice. But I'm not sure that this is real life pen testing. I mean this is so simple only nmap a...

  • I always thought it's possible to track attackers unless they try to hide their identities using some form of "physical" disguise. No matter how many proxies you use even TOR seems to be traceable by ...

  • If I copied the wifi essid and channel and did a de-authentication to the clients of the wifi that I want to hack and started a wifi of my own with the same essid, bssid and channel and I started capt...

  • The Israeli Minister of the Interior is pushing legislation to introduce biometric IDs. On the one hand I hear his argument that it can help to prevent identity theft. On the other hand, something m...