Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Steve

OIDC Flow for SPA and RESTful API

Posted on July 13, 2016 by Steve

I’m building a Single-Page App (SPA) and a RESTful API. The API needs security – certain users can only make calls to certain endpoints. I have an external Identity Provider (IdP (Okta)) that I want the user to authenticate w… Continue reading OIDC Flow for SPA and RESTful API→

Posted in API, openid-connect, single-page-app

OIDC Flow for SPA and RESTful API

Posted on July 13, 2016 by Steve

I’m building a Single-Page App (SPA) and a RESTful API. The API needs security – certain users can only make calls to certain endpoints. I have an external Identity Provider (IdP (Okta)) that I want the user to authenticate w… Continue reading OIDC Flow for SPA and RESTful API→

Posted in API, openid-connect, single-page-app

OS fingerprinting via TCP

Posted on April 17, 2016 by Steve

I have searched online about this topic and the only information I got is that TCP SYN/ACK can be used to know the type of the target OS. If that is true, I don’t understand how this occurs? Does TCP handshaking lead to OS fi… Continue reading OS fingerprinting via TCP→

Posted in ip, os-fingerprinting, TCP | Tagged fingerprinting

Covert, Overt, and side channels

Posted on February 10, 2016 by Steve

I am really confused between the following three terms:

Overt Channel.
Covert Channel.
Side-Channel.

I feel frustrated! I’ve been searching about them to find a clear explanation but I keep getting confused more. I REALLY… Continue reading Covert, Overt, and side channels→

Posted in covert channel, Cryptography, encryption, side-channel, timing-attack

Isolating Computer on Home Network Using Multiple Routers

Posted on February 9, 2016 by Steve

My goal is to isolate a computer on my home network. This computer (a rapsberry pi) should be considered untrusted and is accessible from the internet (port 22). I need a solution that will prevent this raspberry pi from accessing or inter… Continue reading Isolating Computer on Home Network Using Multiple Routers→

Posted in firewalls, network

Hiding database passwords for classic ASP connection strings

Posted on October 29, 2015 by Steve

I’m looking at some old classic ASP sites which could do with a bit of tightening up. The SQL server database connection string has the password in clear text within an include file on the server. Obviously this is nasty as anyone with acc… Continue reading Hiding database passwords for classic ASP connection strings→

Posted in classic-asp, passwords

Hiding database passwords for classic ASP connection strings

Posted on October 29, 2015 by Steve

Looking at some old classic ASP sites which could do with a bit of tightening up. The SQL server database connection string has the password in clear text within an include file on the server. Obviously this is nasty as anyon… Continue reading Hiding database passwords for classic ASP connection strings→

Posted in classic-asp, passwords

Where to find safe downloads of R.A.T. like Dark Comet or Nj Rat? [on hold]

Posted on April 3, 2015 by Steve

How serious hackers find them ? Because when I search, it seems that most of the downloads I come across may contain backdoor.
Is there some kind of “official” site for one good R.A.T.?

Thanks.

Continue reading Where to find safe downloads of R.A.T. like Dark Comet or Nj Rat? [on hold]→

Posted in Remote Desktop, Software

What are the risk implications of not verifying referer header on login form?

Posted on April 17, 2013 by Steve

Imagine a generic web application with a login form to access the application. Regardless of how the actual authentication is performed, what are the implications of not checking the referer header to verify the submit reques… Continue reading What are the risk implications of not verifying referer header on login form?→

Posted in CSRF, Referer, risk, validation

Tool or Process to check for AES-NI support on processor?

Posted on June 16, 2011 by Steve

In another question, Thomas’ answer mentioned the AES-NI instruction set, which piqued my curiosity.

Is there a tool or process available out there to check whether the instruction set is available (besides comparing CPU model numbers)?

… Continue reading Tool or Process to check for AES-NI support on processor?→

Posted in Cryptography, encryption, Hardware

Post navigation

Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • SpaceX Unveils Sweeping Starship V3 Upgrades May 15, 2026
  • [Guest Diary] New Malware Libraries means New Signatures, (Fri, May 15th) May 15, 2026
  • On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email May 15, 2026
  • CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits May 15, 2026
  • An E-Bike Motor From First Principles May 15, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up