Most Popular
1500 questions
66
votes
10 answers
Bad practice to have a "god" password?
Is it bad security practice to have a password that will allow you to access any user account on a website for support purposes? The password would be stored in a secure manner and would be super complex. Huge mistake?

Abe Miessler
- 8,165
- 10
- 45
- 72
66
votes
3 answers
Are the sticks of RAM in my desktop computer volatile? Is it safe to sell them?
I have two sticks of RAM in my computer that I would like to sell or donate. From what I understand some RAM is volatile, losing all its contents when power is gone for a few minutes, and some is non-volatile, retaining that information after power…
user250432
66
votes
3 answers
Why does Windows store Wi-Fi passwords in a reversible format?
Running
netsh wlan export profile key=clear
in PowerShell will dump your current stored Wi-Fi settings, including the password, into xml files inside of whatever directory you are currently in.
Why is it that Windows would store credentials in a…

Wazanator
- 741
- 1
- 6
- 7
66
votes
4 answers
Is an up-to-date browser secure on an out-of-date OS?
Windows 7 support will end on January 14, 2020. Assuming that after that day I still use an updated browser, is it true that I'm still safe? Can it "patch" the OS-based security holes?
Minor question: typically, how long would the browsers stop…

Ooker
- 1,529
- 1
- 13
- 17
66
votes
7 answers
Why would a school need to install certificates on student laptops?
This question indicates parents are to buy laptops for a school to install software and certificates. I am seeking to understand reasons for site certificates installation:
Why would site certificates be installed?
What is the potential for…

gatorback
- 1,541
- 2
- 13
- 17
66
votes
6 answers
Why should we care about Adobe Flash?
I was under the impression that Adobe Flash was dead, and that browsers were no longer natively supporting Flash? Why therefore, is there a large amount of hype online about a new remote code execution vulnerability in flash?

KingJohnno
- 1,155
- 2
- 11
- 19
66
votes
7 answers
Is it safe/wise to store a salt in the same field as the hashed password?
In using Argon2 for hashing passwords in my application, I've noticed it generates a string like this (e.g. for password "rabbit"):
$argon2i$v=19$m=65536,t=3,p=1$YOtX2//7NoD/owm8RZ8llw==$fPn4sPgkFAuBJo3M3UzcGss3dJysxLJdPdvojRF20ZE=
My understanding…

PenumbraBrah
- 771
- 1
- 5
- 6
66
votes
3 answers
Why is Firefox (and only Firefox) reporting that my connection is insecure on multiple sites?
After installing Firefox 54.0.1 on my work laptop, the first page I see warns me that "Your connection is not secure" when opening https://www.mozilla.org/.
"The owner of Firefox has configured their website improperly"
After browsing a bit more, I…

Stevoisiak
- 1,535
- 1
- 12
- 27
66
votes
1 answer
What are the implications of a SHA-1 collision being found?
Google have announced the discovery of a SHA-1 collision between two PDF files with distinct content.
While SHA-1 hashes are no longer permitted for SSL/TLS certificate fingerprints, and other measures would prevent certificate fingerprints from…

Matthew
- 27,263
- 7
- 89
- 101
66
votes
1 answer
What's the risk if I accidently type my password into a username field (Windows logon)?
I'm used to logging into my personal Mac which is a password-only field (like waking from sleep mode). Sometimes I have to use a Windows network on which I have an account, but of course I have to type my username first. Still, going right into my…

Matt
- 3,212
- 2
- 21
- 27
66
votes
9 answers
Proving creation time/date of a screenshot
I have to produce a screenshot of a web page, and want to make sure others will know without any doubt that this screenshot has been produced today. That is, I would like to embed today's date in the screenshot as irrefutable proof the screenshot…

User
- 763
- 1
- 5
- 6
66
votes
4 answers
What is the point of gibberish spam
I fairly often happen across forums spammed with messages such as:
Arugula (Eruca sativa) is an quarterly green, pretended or roquette.
It's been Traditional times, overclever 20 flat has be useful to
"foodie" movement.Before impediment 1990s,…

Hot Licks
- 917
- 7
- 14
66
votes
5 answers
HTTPS web service switched to HTTP. What can go wrong?
I recently visited a website which used to have an HTTPS connection. Now it has just a plain HTTP connection, and the authentication method has changed from user+password to "authenticate with Google account".
I contacted them and asked them why…

Peque
- 663
- 1
- 5
- 7
66
votes
4 answers
Why should servers be placed outside of the corporate network?
In an answer to How do you deal with massive port scans?, user tylerl said:
... And you, like a wise IT admin, run all your servers elsewhere on the internet, not inside your corp network, for a whole raft of reasons I won't go into here
As a…

topher
- 821
- 8
- 13
66
votes
3 answers
Why do email programs block xml files?
A colleague sent a .xml file to me earlier today, which was blocked by Outlook. As we were discussing the workaround (put it in a .zip), we got to wondering why .xml files are blocked.
My colleague reckons it's because the browser is the default…

KidneyChris
- 695
- 1
- 5
- 7