Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: D.W.

Why do browsers allow public websites to attack intranet sites?

Posted on April 7, 2013 by D.W.

When I’m visiting a website on the public internet, the website can cause my browser to send requests to a local IP address (such as 10.0.0.1). This can be used to attack internal web sites, e.g., through
CSRF attacks.
Why do browsers all… Continue reading Why do browsers allow public websites to attack intranet sites?→

Posted in attack-prevention, CSRF, web browser

How is hibernation supported, on machines with UEFI Secure Boot?

Posted on January 16, 2013 by D.W.

I’ve been learning about UEFI Secure Boot, which attempts to prevent “bootkits” by locking down the boot process so that only signed bootloaders and kernels can be loaded.

Hibernation seems like a major attack vector. Hiber… Continue reading How is hibernation supported, on machines with UEFI Secure Boot?→

Posted in boot, Hardware, Operating Systems, uefi

Does "late launch"/"dynamic chain of trust" allow remote attestation?

Posted on November 24, 2012 by D.W.

One of the features support by modern processes and Trusted Platform Modules is “dynamic chain of trust” (also known under the acronym DRTM, for dynamic root of trust measurement). This allows loading a critical piece of sof… Continue reading Does "late launch"/"dynamic chain of trust" allow remote attestation?→

Posted in remote-attestation, trusted-computing

Does any tablet support remote attestation?

Posted on November 19, 2012 by D.W.

Some PCs come with a TPM. One of the nifty capabilities of TPMs is the ability to perform remote attestation. Remote attestation allows your computer to tell a third computer what software your computer is currently running — and this s… Continue reading Does any tablet support remote attestation?→

Posted in Hardware, Mobile, remote-attestation, trusted-computing

Security risks with JSONP?

Posted on October 31, 2012 by D.W.

What are the security risks with JSONP? Is using JSONP in a new web application reasonable, from a security perspective, or is it better to use a different method for cross-origin web mashups?

If using JSONP is reasonable, … Continue reading Security risks with JSONP?→

Posted in Ajax, json, web-application

Password resets – what practices should web services follow?

Posted on August 8, 2012 by D.W.

Many of you may have seen How Apple and Amazon Security Flaws Led to My Epic Hacking, where a Wired reporter’s Amazon, Apple, Gmail, and Twitter accounts were successfully hacked. The hacker followed an elaborate sequence of… Continue reading Password resets – what practices should web services follow?→

Posted in authentication, passwords

What do I need to configure, to make sure my software uses /dev/urandom?

Posted on April 30, 2012 by D.W.

When setting up a server, what configuration changes do I need to make sure that all of the software uses /dev/urandom instead of /dev/random?

Some servers don’t have much entropy in the entropy pool (e.g., VPSs). If a software component… Continue reading What do I need to configure, to make sure my software uses /dev/urandom?→

Posted in Configuration, linux, random, Virtualization

Security risks of scanning an unknown QR code

Posted on April 11, 2012 by D.W.

What are the security risks of scanning a QR code from an untrusted source?

If the QR code was constructed by an attacker, what can the attacker do to me? Do widely used QR scanners have any known vulnerabilities? What information can b… Continue reading Security risks of scanning an unknown QR code→

Posted in attacks, known-vulnerabilities, Mobile

Best resources to learn web security attacks? [closed]

Posted on April 8, 2012 by D.W.

Can anyone suggest good resources to learn about vulnerabilities in and attacks on web sites, in a hands-on way, for someone with limited programming experience?

Continue reading Best resources to learn web security attacks? [closed]→

Posted in professional-education, web-application

Can web sites detect whether you are using private browsing mode?

Posted on November 19, 2011 by D.W.

Most modern browsers support "private browsing mode" (also known in Chrome as "Incognito mode"), where the browser does not save any information to disk about your browsing while in this mode.
In modern browsers, can a … Continue reading Can web sites detect whether you are using private browsing mode?→

Posted in privacy, web browser

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • OpenAI Introduces AI-Generated Pets for Its Codex App May 4, 2026
  • Instructure discloses second data breach in less than a year May 4, 2026
  • AI Cameras are Being Deployed Across the Western US for Early Detection of Wildfires May 3, 2026
  • Carbon Pollution Is Making Food Less Nutritious, Risking the Health of Billions May 3, 2026
  • ChatGPT advanced account security adds passkeys and hardware keys May 3, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up