Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Kevin Morssink

What is the effect on a domain when the secondary name server is compromised?

Posted on March 16, 2017 by Kevin Morssink

I’ve heard of a case wherein the domain name of the secondary name server was expired and free to register.

Lets say example.com has two registered nameservers:

example-ns1.com (primary)
example-ns2.com (secondary)

The d… Continue reading What is the effect on a domain when the secondary name server is compromised?→

Posted in dns, dns-domain, DNSSEC, Domain, Internet

How is the lack of the "SameSite" cookie flag a risk?

Posted on March 16, 2017 by Kevin Morssink

Nowadays cookies can have HTTPOnly, Secure and SameSite flags. The purposes of HTTPOnly and Secure flags are pretty clear. But what does SameSite scripting prevent exactly and how?

Additionally, how would a scenario of successful “attacki… Continue reading How is the lack of the "SameSite" cookie flag a risk?→

Posted in cookies, HTTP, same origin policy, web-application, websites

Is pfSense secure enough for enterprise use, when properly configured?

Posted on March 14, 2017 by Kevin Morssink

pfSense is a free and open source firewall and router that also
features unified threat management, load balancing, multi WAN, and
more.

An enterprise application (EA) is a large software system platform
designe… Continue reading Is pfSense secure enough for enterprise use, when properly configured?→

Posted in firewalls, IDS, network, opensource

What is the purpose of opportunistic TLS (like STARTTLS)?

Posted on March 1, 2017 by Kevin Morssink

Opportunistic TLS refers to extensions in plain text communication protocols, which offer a way to upgrade a plain text connection to an encrypted (TLS or SSL) connection instead of using a separate port for encrypted comm… Continue reading What is the purpose of opportunistic TLS (like STARTTLS)?→

Posted in encryption, FTP, IMAP, STARTTLS, TLS

What are known domain hijacking methods?

Posted on February 22, 2017 by Kevin Morssink

The definition of domain hijacking is: “to gain (temporarily) control a domain” which could be either through:

Stealing the legal and/or technical ownership of a domain (for example by transferring the domain to another reg… Continue reading What are known domain hijacking methods?→

Posted in dns, Domain, epp, WHOIS

How practical is a laser microphone and how to protect against it?

Posted on February 22, 2017 by Kevin Morssink

A laser microphone is a “surveillance device that uses a laser beam to detect sound vibrations in a distant object”. – Wikipedia.

It’s also known as a Laser Based Listening System (LBLS).

Firstly, how practical is it to … Continue reading How practical is a laser microphone and how to protect against it?→

Posted in surveillance | Tagged Audio

How practical is a laser microphone and how to protect against it?

Posted on February 22, 2017 by Kevin Morssink

A laser microphone is a “surveillance device that uses a laser beam to detect sound vibrations in a distant object”. – Wikipedia.

It’s also known as a Laser Based Listening System (LBLS).

Firstly, how practical or easy i… Continue reading How practical is a laser microphone and how to protect against it?→

Posted in Hardware, surveillance | Tagged Audio

How practical is a laser microphone and how to protect against it?

Posted on February 22, 2017 by Kevin Morssink

A laser microphone is a “surveillance device that uses a laser beam to detect sound vibrations in a distant object”. – Wikipedia.

It’s also known as a Laser Based Listening System (LBLS).

Firstly, how practical or easy is it to use a … Continue reading How practical is a laser microphone and how to protect against it?→

Posted in Hardware, surveillance | Tagged Audio

What is the exact difference between regular OCSP and OCSP stapling?

Posted on February 21, 2017 by Kevin Morssink

What is the exact difference between the Online Certificate Status Protocol (OCSP) and OCSP stapling, which seems to be “…an alternative approach to the Online Certificate Status Protocol (OCSP)”?

Continue reading What is the exact difference between regular OCSP and OCSP stapling?→

Posted in certificate-revocation, certificates, OCSP, TLS

What is the exact difference between OCSP and OCSP stapling?

Posted on February 21, 2017 by Kevin Morssink

What is the exact difference between the Online Certificate Status Protocol (OCSP) and OCSP stapling, which seems to be “…an alternative approach to the Online Certificate Status Protocol (OCSP)”?

Continue reading What is the exact difference between OCSP and OCSP stapling?→

Posted in certificate-revocation, certificates, OCSP, TLS

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • [Guest Diary] Beyond Cryptojacking: Telegram tdata as a Credential Harvesting Vector, Lessons from a Honeypot Incident, (Wed, Apr 22nd) April 22, 2026
  • The Electromechanical Computer of the B-52’s Star Tracker April 21, 2026
  • Florida Launches Criminal Investigation Into ChatGPT Over School Shooting April 21, 2026
  • Mozilla Uses Anthropic’s Mythos To Fix 271 Bugs In Firefox April 21, 2026
  • OneDrive Now Supports Markdown on the Web April 21, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up