Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: D.W.

Custom data in SSL certificate

Posted on June 19, 2015 by D.W.

I am looking for a way to add extra, custom data in a SSL server certificate issued by a standard CA. Is this possible?

I want to get a SSL server certificate issued by a standard CA, so that it’ll be accepted by standard b… Continue reading Custom data in SSL certificate→

Posted in certificates, public-key-infrastructure, TLS, x.509

Security analysis of Dashlane

Posted on December 9, 2014 by D.W.

I’ve been asked by a user whether I would recommend using the Dashlane password manager. I’m aware that other password managers have had some significant security problems, including XSS and CSRF (see below). Is the Dashlan… Continue reading Security analysis of Dashlane→

Posted in password management, penetration-test, risk analysis

Security analysis of Dashlane

Posted on December 9, 2014 by D.W.

I’ve been asked by a user whether I would recommend using the Dashlane password manager. I’m aware that other password managers have had some significant security problems, including XSS and CSRF (see below). Is the Dashlan… Continue reading Security analysis of Dashlane→

Posted in password management, penetration-test, risk analysis

Security analysis of Dashlane

Posted on December 9, 2014 by D.W.

I’ve been asked by a user whether I would recommend using the Dashlane password manager. I’m aware that other password managers have had some significant security problems, including XSS and CSRF (see below). Is the Dashlan… Continue reading Security analysis of Dashlane→

Posted in password management, penetration-test, risk analysis

Security analysis of Dashlane

Posted on December 9, 2014 by D.W.

I’ve been asked by a user whether I would recommend using the Dashlane password manager. I’m aware that other password managers have had some significant security problems, including XSS and CSRF (see below). Is the Dashlan… Continue reading Security analysis of Dashlane→

Posted in password management, penetration-test, risk analysis

How do I report new malware?

Posted on July 1, 2014 by D.W.

I have a new piece of malware that isn’t detected by current anti-virus vendors. How do I report it to them?

I want to do a good turn and help protect as many people as possible. What is the best and easiest way to get it to as many an… Continue reading How do I report new malware?→

Posted in Incident response, malware, virus

Test STARTTLS configuration of SMTP server

Posted on May 27, 2014 by D.W.

Is there an easy way to test an SMTP server to check for configuration issues associated with STARTTLS encryption, and report on whether it has been configured properly so that email will be encrypted using STARTTLS?

Think of the Qualys S… Continue reading Test STARTTLS configuration of SMTP server→

Posted in SMTP, TLS

Malware that can survive BIOS re-flashing

Posted on October 31, 2013 by D.W.

The well-respected security consultant Dragos Ruiu is reporting that he has been infected with mysterious malware that can survive re-installation of the OS and re-flashing of the OS. In other words, he has taken an infected machine, wipe… Continue reading Malware that can survive BIOS re-flashing→

Posted in APT, Incident response, malware

Possible to detect packed executable?

Posted on October 8, 2013 by D.W.

A packer is a way of obfuscating an executable program, i.e., transforming so the result is still executable and has the same effect when run, but looks different (so it won’t be detected by static anti-virus). Bad guys ofte… Continue reading Possible to detect packed executable?→

Posted in antimalware, antivirus, detection, malware

How to audit web servers for resistance/vulnerability to BREACH

Posted on August 2, 2013 by D.W.

BREACH, a new attack on SSL that targets HTTP compression, has recently been publicly announced.

I manage a few web servers. How can I audit them to check which of them are potentially vulnerable to BREACH? Is there a simple way to scan… Continue reading How to audit web servers for resistance/vulnerability to BREACH→

Posted in Configuration, hardening, TLS, vulnerability-scanners

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Former Nintendo Executive Says Amazon Once Requested ‘Illegal’ Price Discounts May 3, 2026
  • Digital Decluttering: The Annual Checkup Went Poorly ⭐️ May 3, 2026
  • Three-Axis Camera Slider From 3D Printer Parts May 3, 2026
  • Wireshark 4.6.5 Released, (Sun, May 3rd) May 3, 2026
  • ChatGPT Became So Obsessed With Goblins That OpenAI Had to Intervene May 3, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up