Most Popular

1500 questions
41
votes
7 answers

Can we tamper-proof a game that's sold along with the Windows machine it runs on?

We want to protect a game that is basically sold with the computer containing it. The security is done this way: The HDD is encrypted using hardware TPM 1.2, which holds a unique key to decrypt the OS only in that specific computer. So Windows will…
youns
  • 591
  • 1
  • 4
  • 5
41
votes
5 answers

Is it safe to upload & scan personal files on VirusTotal?

I had an idea to make a plugin for one of my email clients where my users will be able to upload & scan attachments using VirusTotal service, but then again I was worried about their privacy and security of uploading personal files which may have…
Mirsad
  • 10,075
  • 8
  • 33
  • 54
41
votes
4 answers

Are there any known cases of antivirus software intentionally sending false alarms?

First things first, I'm not asking this question because of any specific alarm on my PC that I suspect to be false. It's just that from the perspective of the software industry, it would make some sense to implement false alarms every now and then,…
MaxD
  • 503
  • 4
  • 9
41
votes
3 answers

Can anti-virus/virus protection be used to spy on you?

I'm a complete noob when it comes to these subjects. But here goes... Let's say someone is using a VPN, TOR, or some other tool to enhance their privacy. As I understand it, you are discouraged from using plugins, various apps, and other things as…
Lancadin
  • 509
  • 4
  • 7
41
votes
3 answers

Why is the issuer certificate different at my workplace and at home?

I have viewed Gmail's certificate chain at my workplace, and I realised it's different. It looks like this: Root CA Operative CA1 ___________.net mail.google.com When I get the certificate chain at home, it looks like…
ampika
  • 655
  • 7
  • 13
41
votes
6 answers

Why hasn't it become the norm to inhibit repeated password guesses?

Everyone is aware of the convention/need for strong passwords. With the number of different kinds of clues people can use in their passwords, plus the various permutations of caps and digit-letter substitution, a hacker would need to make many…
donjuedo
  • 659
  • 1
  • 5
  • 8
41
votes
10 answers

Are there any OSes that verify program signatures before executing them?

If so, what are these OSes? Are they specially crafted? How difficult is it to apply this kind of program verification to the everyday OSes we use? If not, why haven't people invented such OSes? Package signature verification is quite common with…
Cyker
  • 1,613
  • 12
  • 17
41
votes
7 answers

What are some important concepts to teach developers about cross-site scripting (XSS)?

I'm helping with a one-hour training for developers (~100 of them) on cross-site scripting. What are some concepts you think are indispensable to get across to them? Right now we have: Difference between reflected and stored Layers of defense…
mcgyver5
  • 6,844
  • 2
  • 26
  • 46
41
votes
2 answers

What triggers Google's reCAPTCHA

I noticed that Google's "I am not a robot" reCAPTCHA forces me to check correct images on my computer. I installed a virtual machine and tried there. Same thing. Used proxy. Same thing too. Then I used another computer in the same network (same…
sanjihan
  • 639
  • 2
  • 7
  • 11
41
votes
5 answers

My WiFi network is replaced by another network. Am I being hacked?

To begin with, I am not very computer savvy. I am an older person with an older computer and a 2003 Windows XP using Google Chrome for a browser. (If anyone is old enough to remember when Windows first came out, and remembers their hologram…
Susie
  • 407
  • 1
  • 4
  • 6
41
votes
2 answers

Why hasn't anyone taken over Tor yet?

Tor is known to encrypt the transferred content and the meta information by layering the encryption. I know there have been correlation attacks that deanonymized some users by federal agencies. Why do they not take over the system? There are ~7000…
N. Nowak
  • 585
  • 4
  • 13
41
votes
7 answers

Somebody hacked my router and changed my wifi SSID

One of my neighbours hacked the password of my router and he uses my limited internet package. I change the wifi SSID almost daily, but he can hack it easily. Today, he changed the SSID to a hate speech "insult". How can I stop him? I need a quick…
user2824371
  • 539
  • 1
  • 4
  • 7
41
votes
7 answers

Is there any legitimate reason to install yourself as a root CA?

Follow up from comments on another question. Is there any reason as to why you might install yourself as a root CA on your own network? The only reason I can think of is forcing computers in the network to trust your own self signed certificates…
Dan
  • 769
  • 7
  • 17
41
votes
5 answers

Is this an evidence of a Skype communication being spied on?

A couple of days ago I was having a conversation using Skype, then I wanted to share a link to a page with the interlocutor. I didn't want to let her understand the link content by just looking at the URL so I shortened it with Google shortening…
Matteo Umili
  • 901
  • 1
  • 8
  • 11
40
votes
3 answers

Is Ghostery safe to use?

I've heard about Ghostery, a browser extension/plugin that blocks web trackers. But according to this link it sells our data. Are add-ons and plugins open source in Firefox? Is there another alternative to Ghostery?
CatCoder
  • 559
  • 1
  • 5
  • 8