Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: null

How to pentest an .ica file

Posted on January 9, 2017 by null

I need to pentest a .ica file [ a citrix file]. I need to log into citrix, download the .ica file. From this point – On launching the .ica file – I need to pentest. Any guidance on how to proceed, tools to use would be much … Continue reading How to pentest an .ica file→

Posted in appsec, penetration-test

Principles of cache attacks

Posted on June 5, 2016 by null

There are many scientific publications that deal with cache attacks. Most recently, the CacheBleed attack was published which exploits cache bank conflicts on the Intel Sandy Bridge architecture. Most timing attacks use a similar approach:… Continue reading Principles of cache attacks→

Posted in caching, side-channel, timing-attack

GnuPG expiration date differs between public and secret key

Posted on October 8, 2015 by null

I exported the secret part of my master key for security reasons. Now I had to extend the expiration date of my key for six months.

When typing gpg –list-keys in my console, the following appears

pub 4096R/D11FEC22 2015-… Continue reading GnuPG expiration date differs between public and secret key→

Posted in GnuPG

Are PGP/GnuPG trust information transferred to key servers?

Posted on June 18, 2015 by null

When signing a key X in the PGP Web of Trust model, I assign the key full validity. Other people who have my key in their key ring can regard X as valid as far as they fully trust me (owner trust).

This mechanism only works if people kno… Continue reading Are PGP/GnuPG trust information transferred to key servers?→

Posted in GnuPG, PGP, web of trust

Hierarchical PKI trust model

Posted on May 12, 2015 by null

Suppose we have the hierarchical trust model as seen below.

Alice will trust Doris’ public key iff there is a Certifcation Path from her to Doris. Alice thus pocesses a valid certificate of A.

Does Alice need to have a … Continue reading Hierarchical PKI trust model→

Posted in public-key-infrastructure, trust

How to make undetectable malware [closed]

Posted on March 3, 2015 by null

Fred Cohen in 1986 has proved in his Ph.D. thesis the undecidability of viral detection (no perfect virus checker can ever exist).

Does this imply that there exists a totally undectable virus?

Else is it possible for a malw… Continue reading How to make undetectable malware [closed]→

Posted in antivirus, attack-vector, malware, virus

Post navigation

Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • ISC Stormcast For Monday, April 20th, 2026 https://isc.sans.edu/podcastdetail/9898, (Mon, Apr 20th) April 20, 2026
  • Voyager 1 is Running Out of Power. NASA Just Switched Part of It Off April 19, 2026
  • Hackaday Links: April 19, 2026 April 19, 2026
  • Nobel Prize-Winning Physicist Predicts Humankind Won’t Survive Another 50 Years April 19, 2026
  • 2026 Green Powered Challenge: The Eternal Headphones April 19, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up