Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: John

Central storage of passport biometric data? [on hold]

Posted on August 16, 2018 by John

Is biometric data (photo, fingerprints etc). on new EU passports stored somewhere centrally?

Continue reading Central storage of passport biometric data? [on hold]→

Posted in Identity, rfid, storage

Why is the same origin policy sensible – for requests?

Posted on August 7, 2018 by John

This is not the same question as Why is the same origin policy so important?.

That one asks only about why cookies are only ever send to origin they came from, which I understand.

What I don’t understand is why there’s a re… Continue reading Why is the same origin policy sensible – for requests?→

Posted in CORS, same origin policy, web browser

Why does RSA-PSS require a pseudo-random-generator? [on hold]

Posted on July 16, 2018 by John

I noticed that the Sign method takes a pseudo-random number generator to sign a message. Why is such a generator needed? After all, verifier has no idea about any pseudo-random number?

It is a RSA-PSS scheme.

Continue reading Why does RSA-PSS require a pseudo-random-generator? [on hold]→

Posted in digital-signature, RSA

Management network access from internet-accessible router

Posted on June 19, 2018 by John

In my company, we have a firewall as an edge device to the internet. Behind this central firewall we have management network. We now have to put a router in front of central firewall, as part of some services from ISP.
This router’s interf… Continue reading Management network access from internet-accessible router→

Posted in isp, network, router, segmentation

Network product (software and hardware) vendors independent from NSA in 2018

Posted on April 28, 2018 by John

Which vendors of network products like firewalls, routers, switches, VPN softwares and similar are likely to be free from backdoors, already built in surveillance capabilities, secretly broken encryption keys inserted by NSA?… Continue reading Network product (software and hardware) vendors independent from NSA in 2018→

Posted in nsa, vendor-selection

chrome Extension navigator.getUserMedia not asking for the mic permission [on hold]

Posted on April 16, 2018 by John

I am trying to use webrtc in chrome extension. I am trying with this code to give permissions of mic.

navigator.getUserMedia = navigator.getUserMedia || navigator.webkitGetUserMedia || navigator.mozGetUserMedia || navigator…. Continue reading chrome Extension navigator.getUserMedia not asking for the mic permission [on hold]→

Posted in browser extensions, Chrome, javascript

Does a VPN Router also encrypts the data being sent from a mobile device

Posted on April 8, 2018 by John

I have 3 questions about a VPN and especially a VPN Router:

1) I know exactly what a VPN is and what wifi encryption (wpa/wpa2 etc.) is, but what I can’t seem to understand is if a VPN Router will add more encryption on the … Continue reading Does a VPN Router also encrypts the data being sent from a mobile device→

Posted in VPN

Buffer overflows on the heap vs the stack

Posted on April 6, 2018 by John

It is my current understanding that in order to successfully exploit a stack-based buffer overflow vulnerability, we must first overflow the buffer, thus overwriting the return pointer and gaining control of EIP. Once we control EIP, we ca… Continue reading Buffer overflows on the heap vs the stack→

Posted in buffer overflow, Heap Overflow

Is it safe to open a message in inbox? (but not the GIF itself?)

Posted on March 31, 2018 by John

I received message in my inbox of facebook which says my friend sent me a gif.
Now, is it safe if I only see the message? By seeing the message I mean “just” the message itself, and not click on the “gif”. is it safe?
Or it i… Continue reading Is it safe to open a message in inbox? (but not the GIF itself?)→

Posted in Facebook, malware, virus

Generate a wordlist using John the Ripper

Posted on March 29, 2018 by John

I want to generate wordlist with these rules: 8 characters, at least one uppercase letter, at least one lowercase letter, exactly two numbers. I’ve done a lot of google searching, and can’t seem to understand how to do this. Can I get some… Continue reading Generate a wordlist using John the Ripper→

Posted in John the Ripper

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • ISC Stormcast For Thursday, May 7th, 2026 https://isc.sans.edu/podcastdetail/9922, (Thu, May 7th) May 7, 2026
  • An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th) May 7, 2026
  • I’ve fully converted to adaptive chargers from fast ones and already feel safer May 7, 2026
  • Smashing Security podcast #466: Meta sees everything, Copy Fail, and a deepfake gets hired May 6, 2026
  • A 1947 Radio Gets A Face Lift May 6, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up