Most Popular
1500 questions
68
votes
2 answers
What's the difference between HMAC-SHA256(key, data) and SHA256(key + data)
Is there anything different about how secure these two hashing algorithms are? Does HMAC "fuse" the data and the key in a special way that's more security-aware?

phillips1012
- 781
- 1
- 6
- 3
68
votes
6 answers
Pattern to allow multiple persons to decrypt a document, without sharing the encryption key?
Current setup
We have a service that allows users to upload documents through a website and stores the uploaded documents encrypted on disk.
The documents on disk are encrypted with a per-user key, which is randomly generated upon account creation.…

Monika
- 1,092
- 1
- 10
- 21
68
votes
6 answers
How do some sites (e.g. online banks) only ask for specific characters from a password without storing it as plaintext?
I thought How can a system enforce a minimum number of changed characters... would answer my question, but it seems this is a different case.
When I sign on to my online banking account, I'm prompted for three random digits from a four digit PIN,…

alexmuller
- 1,061
- 1
- 9
- 13
68
votes
4 answers
How did the brute-forcers get my IP address so quickly?
This is probably a massive noob question, but Google results aren’t being helpful and I couldn’t find something specific here.
I made this server that just hosts IRC, HTTP and SSH for some friends. I have done this sort of thing before, and to my…

Architect
- 691
- 1
- 4
- 6
68
votes
21 answers
Lessons learned and misconceptions regarding encryption and cryptology
Cryptology is such a broad subject that even experienced coders will almost always make mistakes the first few times around. However encryption is such an important topic, often we can't afford to have these mistakes.
The intent of this question…

makerofthings7
- 50,488
- 54
- 253
- 542
68
votes
1 answer
Unusual mail headers show evidence of MTA attack. Have I been pwned?
Today I found an extremely unusual email in my catchall inbox, without subject, sender or content. My Gmail client for android reported the mail was sent by me, triggering a nuclear alert in my mind.
I had fear that someone had guessed my robust…

usr-local-ΕΨΗΕΛΩΝ
- 5,361
- 2
- 18
- 35
68
votes
5 answers
What is a YubiKey and how does it work?
How do YubiKeys work? Are there any alternatives?
Here is a picture of one:

Gabriel Fair
- 1,515
- 2
- 13
- 23
68
votes
2 answers
What are the risks of not patching a server or hypervisor for Meltdown?
The patch for Meltdown is rumoured to incur a 30% performance penalty, which would be nice to avoid if possible. So this becomes a Security vs Performance risk-assessment problem.
I am looking for a rule-of-thumb for assessing the risk of not…

Mike Ounsworth
- 58,107
- 21
- 154
- 209
68
votes
9 answers
How secure is TeamViewer for simple remote support?
I'm deploying a web-based ERP system for a customer, such that both the server and the client machines will be inside the customer's intranet. I was advised in another question not to use TeamViewer to access the server, using more secure means…

mgibsonbr
- 2,925
- 2
- 21
- 35
68
votes
8 answers
Am I experiencing a brute force attack?
When checking the auth log of a server with the command:
grep sshd.\*Failed /var/log/auth.log | less
I see thousands of lines like this:
Jan 12 11:27:10 ubuntu-leno1 sshd[8423]: Failed password for invalid user admins from 172.25.1.1 port 44216…

syldor
- 771
- 1
- 5
- 8
67
votes
12 answers
Do we really need a long and complicated password for websites?
Most of websites that handle important information (Gmail, for instance) have some kind of brute force protection. Sometimes if you try more than X times it will lock the account or at least give you a captcha to solve.
Currently all the security…

drpexe
- 775
- 1
- 5
- 12
67
votes
6 answers
Four-factor authentication
I'm sure you've all heard of two-factor/multi-factor authentication. Basically it comes down to these factors:
Knowledge - something you know (e.g. password, PIN, pattern)
Possession - something you have (e.g. mobile phone, credit card,…

rink.attendant.6
- 2,247
- 4
- 23
- 35
67
votes
13 answers
Storing KeePass database in cloud. How safe?
It certainly would be more convenient to store my KeePass database on either S3, Dropbox, or better yet SpiderOak. My fear is having my cloud storage account compromised then having the credentials recovered by either brute force or some other…

dperry1973
- 773
- 1
- 5
- 5
67
votes
9 answers
Why isn't open WiFi encrypted?
As far as I understand, WiFi networks that require no password send traffic through the air unencrypted. Those that require a password encrypt each connection uniquely, even if they're all using the same password.
If this is true, I don't understand…

Nathan Long
- 2,644
- 4
- 21
- 28
67
votes
5 answers
What can an attacker do with Bluetooth and how should it be mitigated?
What are the security risks of Bluetooth and what technologies and best practices should be used to protect my device? What can an attacker do once a malicious device is paired with mine?
Specifically
Is it a good idea to remove & re-pair my…

makerofthings7
- 50,488
- 54
- 253
- 542