Are there better methods of sustaining forensic integrity apart from disk hashing?

As far as I’ve heard, hashing a disk image before computer forensics is started, and then comparing that hash to a new hash after the forensics is finished is the most common way to make sure that there is no tampering with the disk during… Continue reading Are there better methods of sustaining forensic integrity apart from disk hashing?

Is Homomorphic SQL Query Encryption a good idea – and should I use It?

My web app still needs a lot of work on it in the security department, so I’m considering implementing homomorphic encryption for my SQL database- to help protect from the outcomes of SQLi.
I know the basic principles of how homomorphic en… Continue reading Is Homomorphic SQL Query Encryption a good idea – and should I use It?

Can software EVER pick up physical keyloggers? And what do they actually look like?

I’m not talking about software keyloggers that are, well, quite obviously, software.
I’m talking about the nasty things that physically sit somewhere between your keyboard and processors. So I imagine that because of this, it would very ha… Continue reading Can software EVER pick up physical keyloggers? And what do they actually look like?

Is my wesbite stil vulnerable if sqlmap cannot retrieve the database names but CAN successfully inject?

I am (basically) pen-testing my own website, and I do have a new WAF, but have temporarily taken it down in a safe, testing environment (the one on my actual site is still up.)
This is the same site that was receiving an enormous amount of… Continue reading Is my wesbite stil vulnerable if sqlmap cannot retrieve the database names but CAN successfully inject?

Why does Windows force you to do a mandatory restart once in a while? Apparently, its for ‘security purposes.’

I haven’t needed to restart my computer for a while now, as I just usually shut down when I’m finished, and then reboot when I use Windows again. I dual-boot, so of course I often restart to a different OS, but hardly ever back to windows…. Continue reading Why does Windows force you to do a mandatory restart once in a while? Apparently, its for ‘security purposes.’

Why does the Signal Protocol use a symmetric key for encryption- when asymmetric keys are more secure? [duplicate]

The Signal Protocol, as many of you would know, is used by many applications such as WhatsApp and Signal. These corporations, I can vouch for, would definitely use the most secure protocol they could- as WhatsApp, for example, would happil… Continue reading Why does the Signal Protocol use a symmetric key for encryption- when asymmetric keys are more secure? [duplicate]