Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

How to spamproof a mailto link?

Protecting email addresses in mailto links from ...READ MORE

Jan 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
593 views
0 votes
1 answer

How to best obfuscate a built-in key in an application?

Embedding a key directly within an application's ...READ MORE

Jan 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
575 views
0 votes
1 answer

Is renaming folders & files and changing file types an effective solution for file security of a PC?

Renaming files or changing their extensions to ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
849 views
0 votes
1 answer

What are the three most common techniques used to obfuscate data?

Data obfuscation involves transforming data to conceal ...READ MORE

Jan 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
573 views
0 votes
1 answer

Does a private key always generate the same public key?

Yes, a private key always generates the ...READ MORE

Jan 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
801 views
0 votes
1 answer

How do you check if SNMP is working correctly?

Ensuring that Simple Network Management Protocol (SNMP) ...READ MORE

Dec 19, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,646 views
0 votes
1 answer

Is there a reason why legit websites are using this type of obfuscation?

Legitimate websites employ code obfuscation for several ...READ MORE

Jan 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
546 views
0 votes
1 answer

Are GIAC certs open book (unlike CISSP)?

Yes, GIAC (Global Information Assurance Certification) exams ...READ MORE

Jan 3, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
976 views
0 votes
1 answer

How to Detect and Secure Vulnerable Open Ports and Services?

Detecting and securing vulnerable open ports and ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
779 views
0 votes
1 answer

How to avoid key-loggers when authenticating access?

Keyloggers are malicious tools that record keystrokes ...READ MORE

Jan 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
486 views
0 votes
1 answer

Is HTTP Authorization header encrypted?

When transmitting an HTTP Authorization header over ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
593 views
0 votes
1 answer

Is an Open Port on a Firewall Without a Service Bound to It a Security Vulnerability?

An open port on a firewall without ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
740 views
0 votes
1 answer

How to Speed Up Nmap SSL Service Detection on Non-Standard Ports?

Scanning for SSL services on non-standard ports ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
737 views
0 votes
1 answer

What are the categories of security control?

Security controls are essential measures implemented to ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
713 views
0 votes
1 answer

What are the Design Flaws of the WPS PIN System and How Can it be Secured for Future Use?

Wi-Fi Protected Setup (WPS) was introduced to ...READ MORE

Jan 3, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
883 views
0 votes
1 answer

What is collision resistance in a hash function?

Collision resistance is a fundamental property of ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
552 views
0 votes
1 answer

How to determine the hashing algorithm of a public key in the certificate?

To determine the hashing algorithm used to ...READ MORE

Jan 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
658 views
0 votes
1 answer

Why should you not block or close ports in a firewall?

Blocking or closing ports in a firewall ...READ MORE

Jan 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
637 views
0 votes
1 answer

What is the difference between non-repudiation and plausible deniability?

Non-repudiation and plausible deniability are two distinct ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,132 views
0 votes
1 answer

Is it possible to get a list of services running on an open port?

Yes, it is possible to identify services ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
642 views
0 votes
1 answer

How is the public key included in the CSR?

When creating a Certificate Signing Request (CSR), ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
481 views
0 votes
1 answer

Is SSH public key authentication secure?

SSH public key authentication is generally more ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
480 views
0 votes
1 answer

Is it possible to build unbreakable Protocol Obfuscation?

Achieving unbreakable protocol obfuscation—where a system is entirely ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
477 views
0 votes
1 answer

Which SSH key is more secure?

When selecting an SSH key type for ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
465 views
0 votes
1 answer

Is encryption in HTTPS done by the browser or by the system?

When a browser establishes an HTTPS connection, ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
459 views
0 votes
1 answer

How Can P2P Systems Recover Compromised Identities Using a Web-of-Trust?

In peer-to-peer (P2P) systems, the Web of ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
454 views
0 votes
1 answer

What happens if an SSL certificate is not renewed?

When an SSL certificate expires and is ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
453 views
0 votes
1 answer

Can I take CompTIA Security+ online?

Yes, you can take the CompTIA Security+ ...READ MORE

Jan 3, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
778 views
0 votes
1 answer

How do I check if a port is open in Nmap?

To check if a specific port is ...READ MORE

Jan 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
554 views
0 votes
1 answer

At which OSI layer does NetBIOS operate, and why is this important?

NetBIOS (Network Basic Input/Output System) primarily operates ...READ MORE

Dec 20, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,355 views
0 votes
1 answer

Is code obfuscation common in FOSS?

In Free and Open-Source Software (FOSS), code ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
438 views
0 votes
1 answer

What are the steps of risk assessment in information security?

Conducting a comprehensive risk assessment in information ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
591 views
0 votes
1 answer

Does SSL/TLS provide non-repudiation service?

SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,049 views
0 votes
1 answer

Which SSH security is stronger?

Ensuring robust SSH security involves careful selection ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
435 views
0 votes
1 answer

What is IP address conflict with another system on the network?

An IP address conflict occurs when two ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
582 views
0 votes
1 answer

What steps should be taken to prevent session hijacking in Tomcat?

Session hijacking is a security threat where ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,117 views
0 votes
1 answer

How secure is binding to localhost in order to prevent remote connections?

Binding a server to localhost (127.0.0.1) is ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
560 views
0 votes
1 answer

Are Security Controls Overlapping?

In information security, overlapping controls, where a ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
560 views
0 votes
1 answer

Does code obfuscation give any measurable security benefit?

Code obfuscation involves deliberately making code difficult ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
405 views
0 votes
1 answer

What is the difference between authenticity and non-repudiation?

Authenticity and non-repudiation are fundamental concepts in ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,013 views
0 votes
1 answer

How does HMAC relate to non-repudiation?

You're correct in observing that HMAC (Hash-Based ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
994 views
0 votes
1 answer

Does Nmap Report Open Ports Indicate Active Services or Just Firewall Configuration?

When Nmap reports a port as open, ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
518 views
0 votes
1 answer

How to Secure Windows Services with Open Ports Without Compromising Functionality?

Securing Windows services that require open ports ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
512 views
0 votes
1 answer

What is the hardest part of the Security+ exam?

Preparing for the CompTIA Security+ exam involves ...READ MORE

Jan 3, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
690 views
0 votes
1 answer

How to set private DNS on Android?

Here's a step-by-step guide to help you ...READ MORE

Nov 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,218 views
0 votes
1 answer

Why would a replay attack be considered a threat to integrity and not confidentiality?

A replay attack involves an attacker intercepting ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
955 views
0 votes
1 answer

How can I get a 12-byte authentication tag in AES-GCM?

To generate a 12-byte (96-bit) authentication tag ...READ MORE

Dec 5, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,854 views
0 votes
1 answer

Are control categories actually exclusive in security?

In information security, controls are commonly categorized ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
415 views
0 votes
1 answer

Is the MFA push notification approval/deny method safe in O365? Concerns over phishing risks and user behavior?

Multi-Factor Authentication (MFA) using push notifications in ...READ MORE

Jan 2, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
617 views
0 votes
1 answer

How can I control the use of admin tools like IP scanners and PsExec to prevent misuse?

Admin tools like IP scanners and PsExec ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
667 views