Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Ben

Google login button – what prevents an rogue app from stealing a token?

Posted on September 7, 2018 by Ben

Here are steps to setup a Google login button on a web client:
https://developers.google.com/identity/sign-in/web/sign-in

When click on the Google login button this pops up:

All the interactions are between the IDP (Googl… Continue reading Google login button – what prevents an rogue app from stealing a token?→

Posted in Google, OAuth, oauth2

Are these claims about public WiFi accurate?

Posted on May 17, 2018 by Ben

I received the following message from my bank:

Be careful when using wireless networks. Some wifi networks are unsecure, meaning that they may allow someone else to access information or files stored on your device. When … Continue reading Are these claims about public WiFi accurate?→

Posted in banks, wifi

Two factor authentication vs. user experience

Posted on April 28, 2018 by Ben

I’m wondering if there’s any reason to implement a username/password with 2FA or, from the user’s perspective, just settle with a username/2FA code. I’m trying to seek a healthy balance between the ease of a sign in process a… Continue reading Two factor authentication vs. user experience→

Posted in multi-factor

How to scan filesystem for suspicious PHP files? [on hold]

Posted on March 22, 2018 by Ben

I would like to scan some directories on my local filesystem for suspicious (eg. obfuscated, system-calls, create-method calls, strange file names, etc.) PHP files.
Is there a known tool or script or anything like that (pref… Continue reading How to scan filesystem for suspicious PHP files? [on hold]→

Posted in malware, PHP

How to protect a small company?

Posted on February 27, 2018 by Ben

I’m setting up a small company (~3 employees) but having about 10 High-End PCs and maybe also open Wlan for guests. The later probably within a separated LAN.

How to provide this Wlan for guests so that guests are not able t… Continue reading How to protect a small company?→

Posted in Internet, network, wifi

Securely launch local application from IE?

Posted on May 15, 2017 by Ben

I am facilitating an management system project in intranet environment(but with internet access for many domain users) for printing barcode labels from a web interface.

1.
The current method our vendor employed is to launch a local bar c… Continue reading Securely launch local application from IE?→

Posted in internet explorer, Windows 10

How should I respond to an unrecognized client in my DHCP logs?

Posted on April 12, 2017 by Ben

I’ve found a strange hostname in my dhcpd.leases file and I’m wondering what steps I should take in response.

I have a simple home network: my modem is plugged into a router running OpenBSD 6.0, and a laptop and an old Netge… Continue reading How should I respond to an unrecognized client in my DHCP logs?→

Posted in DHCP, network, OpenBSD, wifi

How do you scale threat modeling?

Posted on January 1, 2017 by Ben

Small threat models are relatively easy to build but building and maintaining a threat model that contains a few dozen components becomes difficult pretty quickly.

What tools do you use to collaborate across teams to build … Continue reading How do you scale threat modeling?→

Posted in threat modeling

What do browser VPNs actually do?

Posted on December 2, 2015 by Ben

Firstly, I am not sure if this is the correct forum to be asking this question so I apologise if not. What I would like to know is, what do VPN browser plug-ins (such as zenmate) actually do and how secure are they?

I understand that the… Continue reading What do browser VPNs actually do?→

Posted in confidentiality, privacy, VPN

Can ‘cracked’ product keys harm the user in any way?

Posted on March 27, 2015 by Ben

If a user download commercial software through the official, corresponding website, but use a product key which you did not legitimately purchase (e.g. websites that offer a list of product keys for free), does that harm anything other tha… Continue reading Can ‘cracked’ product keys harm the user in any way?→

Posted in license-enforcement, privacy

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Amazon Stops Supporting Pre-2013 Kindles Today. Some Owners Turn to Jailbreaking May 17, 2026
  • Asimov is an Open Source Humanoid Robot For the Rest of Us May 17, 2026
  • Some Datacenters Divert Power from Homes. Will It Drive Homeowners to Solar and Batteries? May 17, 2026
  • After Stumbling From CVE to CVE Will Linux get a Kill Switch? May 16, 2026
  • An Entire Wikipedia That’s 100% AI Hallucinations May 16, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up