Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Ryan

Detecting fraudulent registration

Posted on August 2, 2017 by Ryan

Recently the company’s website was flooded with malicious registrations, where a few people signed up for hundreds of accounts to win an online lottery. Our investigation shows the source may be a group of employed workers (l… Continue reading Detecting fraudulent registration→

Posted in Account Security, CAPTCHA, Fraud, registration, websites

Is there malware on my mac?

Posted on June 5, 2017 by Ryan

So, a funny thing just happened.

I have my (personal) mac connected to the wired enterprise network and have for several months. Today, a couple of guys from IT came busting through the door saying that they were seeing a ma… Continue reading Is there malware on my mac?→

Posted in macosx, malware, network, Trojan

Is it possible to "fake" being connected to a router?

Posted on April 27, 2017 by Ryan

A friend of mine is taking a UNIX systems class and mentioned to me that when they take exams they do so on their computers. That is all students are using their own computer/laptop. Students are not being provided a compute… Continue reading Is it possible to "fake" being connected to a router?→

Posted in digital-signature, linux, network, wifi

Attempting to find a XSS, why doesn’t this piece execute?

Posted on March 21, 2017 by Ryan

I’ve seen these types of instances occur quite often, and I’m curious to why (even without a filter) they won’t execute… as the code is right there. Every occurrence of this I’ve noticed that when you inspect in any devel… Continue reading Attempting to find a XSS, why doesn’t this piece execute?→

Posted in html, xss

What is the point of restricting a google API key by HTTP referer?

Posted on February 22, 2017 by Ryan

If someone has the key and a valid referer, they can use the API key from any client as long as the set referer header, correct?

So is it worthwhile to use this restriction?

Continue reading What is the point of restricting a google API key by HTTP referer?→

Posted in Google, Google Apps

What is the point of restricting a google API key by HTTP referer?

Posted on February 22, 2017 by Ryan

If someone has the key and a valid referer, they can use the API key from any client as long as the set referer header, correct?

So is it worthwhile to use this restriction?

Continue reading What is the point of restricting a google API key by HTTP referer?→

Posted in Google, Google Apps

Storing passwords in text files inside Ubuntu encrypted home directory

Posted on December 15, 2015 by Ryan

I’m interested in getting offlineimap working with my Gmail account so that I can read my emails while offline. My biggest concern with this is that it’s a pretty big workaround to get the .offlineimaprc file to be encrypted … Continue reading Storing passwords in text files inside Ubuntu encrypted home directory→

Posted in encryption, password management

Storing passwords in text files inside Ubuntu encrypted home directory

Posted on December 15, 2015 by Ryan

I’m interested in getting offlineimap working with my Gmail account so that I can read my emails while offline. My biggest concern with this is that it’s a pretty big workaround to get the .offlineimaprc file to be encrypted … Continue reading Storing passwords in text files inside Ubuntu encrypted home directory→

Posted in encryption, password management

Md5 vs Md4 recognition

Posted on November 19, 2015 by Ryan

Is there a way to actually find out whether a hash is MD5 or MD4?

For instance:

10c7ccc7a4f0aff03c915c485565b9da is an MD5 hash
be08c2de91787c51e7aee5dd16ca4f76 is an MD4 hash

I know that there is a difference “security… Continue reading Md5 vs Md4 recognition→

Posted in hash, MD5

Should I generate new SSH private keys for each machine I work from?

Posted on October 11, 2015 by Ryan

I hope this is an appropriate place to ask this question. I’ve been thinking recently about public and private keys, and I’m wondering what the best practices are related to management of my own personal private keys. Specifi… Continue reading Should I generate new SSH private keys for each machine I work from?→

Posted in key management, ssh

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Webinar Today: Securing Identity Across Humans, Machines and AI May 7, 2026
  • Why Outdated Maintenance Software Is a Growing Ransomware Risk May 7, 2026
  • ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories May 7, 2026
  • Google Clarifies How Chrome’s Built-In AI Features Use Local Storage May 7, 2026
  • Cybersecurity Stolen ChipSoft claims patient data confirmed destroyed following cyberattack May 7, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up