The NSA Tried Tracking Bitcoin Users In 2013
Bitcoin was the spy agency’s “#1 priority,” Snowden documents published by The Intercept show. Continue reading The NSA Tried Tracking Bitcoin Users In 2013
Collaborate Disseminate
Bitcoin was the spy agency’s “#1 priority,” Snowden documents published by The Intercept show. Continue reading The NSA Tried Tracking Bitcoin Users In 2013
There were some kernel exploits and CVEs (for example ms11-087 and CVE-2017-8682) about fonts. And there were some malware campaigns like duqu which used zerodays in fonts embedded into docx files.
I wonder if it is secure t… Continue reading How is it secure to open documents with embedded/linked fonts and images
There were some kernel exploits and CVEs (for example ms11-087 and CVE-2017-8682) about fonts. And there were some malware campaigns like duqu which used zerodays in fonts embedded into docx files.
I wonder if it is secure t… Continue reading How is it secure to open documents with embedded/linked fonts and images
I’m assuming that it’s a good idea to document your security protocols, response plans, and attack surfaces.
Of course, if you simply stick all of that information on GitHub (minus your secret of course), then it gives attac… Continue reading How should we store and share information about our security protocols and plans?
A reputable institution asked me, for legitimate reasons, to e-mail a scan of the passport. However, I regard the passport as a sensitive document and am pretty reluctant to use the e-mail to that end, for generic/general sec… Continue reading What is a safe way to transfer a copy of passport?
A reputable and clearly identified institution asked me, for legitimate reasons, to e-mail a scan of the passport. However, I regard the passport as a sensitive document and am pretty reluctant to use the e-mail to that end, … Continue reading Which is a safe way to transfer a copy of a sensitive document?
Check out these resources to learn more about the latest subscription offering from Microsoft that includes Windows and Office 365.
read more Continue reading Resources: Microsoft 365 Documentation and Videos
I have a PC with Windows installed on it (like most people), and I can retrieve data from it using a Linux Live CD if need be. However, it dawns on me that anybody could simply steal any information/data/documents off of my P… Continue reading How to prevent documents from being stolen via Linux live CD
I am asking for a very simple “dumbed-down” answer for a newbie.
Using Adobe Acrobat I can create a self-signed certificate and sign a document as anybody. I can use anyone’s name and anyone’s signature image.
So what’s th… Continue reading Self signed signature in PDF
In order to provide a more responsive experience across various screen sizes, Microsoft is slowly migrating content from their TechNet Library site.
read more Continue reading Microsoft Migrates Windows 10 Technical Documentation to their new Docs Portal