Is my wesbite stil vulnerable if sqlmap cannot retrieve the database names but CAN successfully inject?

I am (basically) pen-testing my own website, and I do have a new WAF, but have temporarily taken it down in a safe, testing environment (the one on my actual site is still up.)
This is the same site that was receiving an enormous amount of… Continue reading Is my wesbite stil vulnerable if sqlmap cannot retrieve the database names but CAN successfully inject?

Why does Windows force you to do a mandatory restart once in a while? Apparently, its for ‘security purposes.’

I haven’t needed to restart my computer for a while now, as I just usually shut down when I’m finished, and then reboot when I use Windows again. I dual-boot, so of course I often restart to a different OS, but hardly ever back to windows…. Continue reading Why does Windows force you to do a mandatory restart once in a while? Apparently, its for ‘security purposes.’

Why does the Signal Protocol use a symmetric key for encryption- when asymmetric keys are more secure? [duplicate]

The Signal Protocol, as many of you would know, is used by many applications such as WhatsApp and Signal. These corporations, I can vouch for, would definitely use the most secure protocol they could- as WhatsApp, for example, would happil… Continue reading Why does the Signal Protocol use a symmetric key for encryption- when asymmetric keys are more secure? [duplicate]

At what point does data wipe after incorrect password attempts become reasonable? [closed]

So a while ago I was talking to a guy who was a high-up security officer for a big bank, and he told me something interesting. He told me (and this isn’t private information or anything,) that after about five incorrect guesses of the pas… Continue reading At what point does data wipe after incorrect password attempts become reasonable? [closed]