Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Celeritas

What typically is the expiration date of a session cookie?

Posted on April 3, 2013 by Celeritas

I need to create a session cookie using JavaScript (for more info see question). I’m wondering what should the expiry date be? I’m guessing it’s the browsing session, so if I don’t set an expiration date this will be used as … Continue reading What typically is the expiration date of a session cookie?→

Posted in cookies, javascript, session management

What’s a good secure file deletion software?

Posted on February 23, 2013 by Celeritas

I’ve used cipher \w which is built into Windows to overwrite free space, but I’m looking for a tool that securely deletes files which have not been deleted yet. It would be a plus (but certainly not necessary) if it had the option to secur… Continue reading What’s a good secure file deletion software?→

Posted in deletion, file system, Windows

Hiding JavaScript source code

Posted on February 14, 2013 by Celeritas

In a web-app should one strive to hide as much of the code as possible, for example from view source? In particular I was wondering should JavaScript be hidden, especially ones used for Ajax? I was thinking that if the JavaSc… Continue reading Hiding JavaScript source code→

Posted in javascript, source code, web-application

Does password protecting an archived file actually encrypt it?

Posted on August 8, 2012 by Celeritas

For example if I use WinRAR to encrypt a file and put a password on the archive how secure is it? I keep a personal journal and am thinking of doing this, or is there a better way? It’s just one huge .docx file.

Continue reading Does password protecting an archived file actually encrypt it?→

Posted in file encryption

What are potential security risks when using an insecure wireless connection?

Posted on July 18, 2012 by Celeritas

If someone is using an insecure wireless connection (for example a hot spot in a coffee shop) does it pose a threat even if the person is using a secure application layer protocol? What I mean by secure application layer prot… Continue reading What are potential security risks when using an insecure wireless connection?→

Posted in ssh, TLS, web browser, web-application, wifi

Using passwords made of words

Posted on June 27, 2012 by Celeritas

People say don’t use passwords in the dictionary but if you use two words isn’t it alright? Dictionaries have at least 10,000 entries so just two words will be 100,000,000 possibilities (and that’s given if the attacker someh… Continue reading Using passwords made of words→

Posted in entropy, hash, password policy, passwords

proxy services for torrents vs encrypting data

Posted on June 18, 2012 by Celeritas

I’ve noticed growing popularity in proxy services for torrent clients; such as BTGuard. Most torrent clients encrypt traffic so aren’t these services pointless? I read that it’s because the encryption is only for obfuscation,… Continue reading proxy services for torrents vs encrypting data→

Posted in encryption, obfuscation, P2P, privacy, Torrent

Post navigation

Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Hundreds of readers bought this E Ink tablet – and I highly recommend it May 7, 2026
  • Motherboard Sales ‘Collapse’ By More Than 25% May 7, 2026
  • 60% of MD5 password hashes are crackable in under an hour May 7, 2026
  • Alexa+ Launches in Early Access in Germany and Austria May 7, 2026
  • Switcher 2026: Apple iPad ⭐ May 7, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up