Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: John

iCloud Private Relay MITM Defense?

Posted on January 11, 2022 by John

When it comes to defending against MITM attacks while using public Wifi, is the security offered by iCloud Private Relay comparable to using a VPN?
Edit:
My motivation for asking the question comes from the PDF overview published by Apple…. Continue reading iCloud Private Relay MITM Defense?→

Posted in apple, Icloud, proxy, VPN

Software signing : multiple certificates

Posted on July 31, 2021 by John

I’m quite new to the cryptography field, and I’m trying to understand a few things:
I used binwalk on Linux to analyse Minecraft.msi, and I found multiple certificates in the .msi See below:

I’m wondering why there are there multiple (4 … Continue reading Software signing : multiple certificates→

Posted in certificates, code signing, public-key-infrastructure, x.509

Disabling IPV6 firewall with IPV6 disabled

Posted on May 28, 2021 by John

Our router (Asus RT-AC68U) has been slowing down our speeds, up until I disabled the IPV6 firewall (Went from 250 to 380, which is the modem cap for now). We’ve always had IPV6 disabled on the router, but I was wondering if it poses any se… Continue reading Disabling IPV6 firewall with IPV6 disabled→

Posted in ipv6

Strange noise on the other end in call, am I being tapped?

Posted on May 24, 2021 by John

My phone makes weird noises (to the person I’m calling) when I call. They describe it as a machine noise. It stops when I unplug my earphones and plug them back. Am I being tapped? I don’t hear it, but they do. If my phone is being tapped,… Continue reading Strange noise on the other end in call, am I being tapped?→

Posted in Account Security

Risks associated with IP whitelisting

Posted on April 13, 2021 by John

I was told that IP whitelisting should not be considered safe and are hence obsolete.
I fail to understand why this statement holds: can IPs be impersonated? if not, then why is it a bad/obsolete way of securing a service? (assuming the tr… Continue reading Risks associated with IP whitelisting→

Posted in ip, whitelist

Recent Facebook leak [duplicate]

Posted on April 5, 2021 by John

I’ve heard about the recent Facebook leak – how do I search for leaks by my phone number – because I remember making a few accounts using phone number a year back, but I do not remember the emails. Thank you

Continue reading Recent Facebook leak [duplicate]→

Posted in Facebook

Can somebody describe how the EBICS protocol work? [closed]

Posted on April 1, 2021 by John

Can somebody describe how the EBICS protocol work?
Which ciphers are used, etc

see

https://en.wikipedia.org/wiki/Electronic_Banking_Internet_Communication_Standard
https://github.com/railslove/epics

Continue reading Can somebody describe how the EBICS protocol work? [closed]→

Posted in protocols

Do iPhones still send packets when they are completely shutdown?

Posted on March 22, 2021 by John

Do iPhones (or just a smart phones in general) send packets when they are fully shutdown? I have heard that they do, but I have not been able to verify such a claim. In an effort to investigate, I ARP Poisoned my own iPhone (legally on my … Continue reading Do iPhones still send packets when they are completely shutdown?→

Posted in arp-spoofing, iOS, iPhone, wireshark

I searched "Amazon.com" in Opera quicksearch and it led me to a strange page [closed]

Posted on March 2, 2021 by John

I searched "amazon.com" in Opera quicksearch and it led me to this site: http://iyfnzgb.com/?pid=9PO1H9V71&dn=amanzon.com
Is it malicious? Opera didn’t open a proper internet page, only a screen with the opera logo. In the Hi… Continue reading I searched "Amazon.com" in Opera quicksearch and it led me to a strange page [closed]→

Posted in malware

Fundamental pieces to remotely scan a network [closed]

Posted on February 21, 2021 by John

What are the fundamental technological pieces to remotely scan a network, such as with Nessus.
Goal: Do risk assessments as a service for small businesses. Thus I’d run tools like Nessus and Nmap and deliver a report with recommendations. … Continue reading Fundamental pieces to remotely scan a network [closed]→

Posted in nessus, nmap, remote-server, vulnerability-scanners

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • PlayGround Games Details Forza Horizon 6’s Xbox Performance and Loyalty Rewards May 4, 2026
  • 5 MacOS command line tools I swear by over their GUI counterparts May 4, 2026
  • Scientists Discover 27 Potential New Planets That Orbit Two Stars May 4, 2026
  • ESP32 Hosts SolarPunk Message Board May 4, 2026
  • 2026 Security Checkup: Bad Medicine ⭐️ May 4, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up