Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Joe

Radius & Network Authentication – what service to choose?

Posted on October 15, 2019 by Joe

These are the choices when looking for (not only) a RADIUS network authentication – IronWifi, clearpass, cloudess, foxpass, jumpcloud

Any others you guys know about? And in case you’ve got any experience with the services a… Continue reading Radius & Network Authentication – what service to choose?→

Posted in captive portal, hotspot, RADIUS

How do I correctly find the address of the stack for stack overflow

Posted on August 28, 2019 by Joe

I have to do a stack overflow attack on a given bit of code (the vulnerability is the gets function in it), and I’m able to change the return address to be anywhere I want.

The goal is to spawn my shell and then return to th… Continue reading How do I correctly find the address of the stack for stack overflow→

Posted in Exploit, linux

How sufficient are these steps to prevent deleted SSD files from being recovered?

Posted on July 28, 2019 by Joe

I’m selling a 4-year-old Dell PC with Windows 10 and two SSDs and I want to be sure that nobody can recover anything from my personal deleted files. So far I’ve done the following.

Completely Bitlocker encrypt both disks,… Continue reading How sufficient are these steps to prevent deleted SSD files from being recovered?→

Posted in bitlocker, Disk Encryption, SSD

Security implications of source code location

Posted on July 24, 2019 by Joe

Were working towards implementing a SDLC for a company and as in any complex environment there are differences of opinion for the new process. Some of the developers want to make use of one directory others want to use anothe… Continue reading Security implications of source code location→

Posted in DevOps, sdlc

Can antiviruses scan /var

Posted on July 6, 2019 by Joe

I was wondering if antiviruses could scan /var or if it was off limits i am trying to understand how antiviruses work and there impact on the file system and any limitations imposed on scanning ability

Continue reading Can antiviruses scan /var→

Posted in antivirus, linux

Can a proxy server redirect traffic to malicious websites or modify downloads?

Posted on July 6, 2019 by Joe

I was wondering if a proxy server from the internet could redirect traffic to malicious websites or download malware or even modify downloads( I do not plan on using a proxy server i found from the internet just wondering )

… Continue reading Can a proxy server redirect traffic to malicious websites or modify downloads?→

Posted in proxy

When writing software do all programs have a signature?

Posted on July 3, 2019 by Joe

I have always been curious if all software have a signature for whatever reason or is only related to AV.

Continue reading When writing software do all programs have a signature?→

Posted in antivirus, Software

How can vulnerability researchers find flaws in OSes / Embedded Systems?

Posted on June 14, 2019 by Joe

Operating Systems and Embedded Systems usually don’t come with source code or binaries that one can review.

How can a vulnerability researcher look for flaws in a system (Architecture, Protocols, etc.) without any access to … Continue reading How can vulnerability researchers find flaws in OSes / Embedded Systems?→

Posted in embedded-system, Operating Systems, Reverse-engineering

Is there a technical security standard for internet facing test environments?

Posted on April 18, 2019 by Joe

We have a number of test environments that are permanently internet facing to accommodate external and automated testers with dynamic IP addresses. While we regularly check the servers for security vulnerabilities etc, we fou… Continue reading Is there a technical security standard for internet facing test environments?→

Posted in Internet, penetration-test, standards

Is it bad practice to remove a resolved report from Open Bug Bounty archive?

Posted on April 15, 2019 by Joe

An XSS vulnerability report was made via Open Bug Bounty, which was fixed, confirmed and a reward was made.

The reporter has marked the issue was resolved. They have further offered to remove the vulnerability from the Open … Continue reading Is it bad practice to remove a resolved report from Open Bug Bounty archive?→

Posted in bug bounty, disclosure

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • US Military Reaches Deals With 7 Tech Companies to Use Their AI on Classified Systems May 3, 2026
  • South Africa’s Draft AI Policy Withdrawn Due to ‘Fictitious’ AI-Generated Citations May 3, 2026
  • Ransomware Is Getting Uglier As Cybercriminals Fake Leaks and Skip Encryption Entirely May 3, 2026
  • Photographing The ISS With A Thrift Store Lens Is Challenging May 3, 2026
  • I upgraded my Bluetooth speakers instead of replacing them – 5 creative ways May 3, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up