Windows 11 cheat sheet: Everything you need to know
This comprehensive guide offers details about Microsoft Windows 11, including new features, system requirements and more. Continue reading Windows 11 cheat sheet: Everything you need to know
Collaborate Disseminate
This comprehensive guide offers details about Microsoft Windows 11, including new features, system requirements and more. Continue reading Windows 11 cheat sheet: Everything you need to know
If the ISO file for an operating system is malicious, is it possible for it to overwrite UEFI code when booted (If secure boot is disabled)?
I am using Selinux now for a while and I like it pretty much. But so far I was not able to setup rules in a way so that I could prevent my browser from reading my private ssh keys. So far I got this setup:
id -Z
staff_u:staff_r:staff_t:s0-… Continue reading Using Selinux to prevent Browser from reading priave SSH keys
I’ve noticed that people don’t use a user account for a specific task;
I keep thinking the concept is called a "service account"
But it causes a lot of issues surrounding security; for instance one should not use their general ad… Continue reading What is it called when you only use a user account for a specific task in your OS?
I am having a discussion with friends and my point is that the older a feature-frozen operating system is, the fewer security bugs are left unpatched and therefore the cost for the company to fix them decreases with age.
My assumption is: … Continue reading What is the frequency of open security bugs in an operating system with increasing age?
I need to build some kind of graph, visual of parent and child process.
example: using pslist or wmic on windows to generate a csv or txt file .. how to transform these info to a visual graph/tree listing every child process under it’s par… Continue reading Process tree graph [closed]
I’m currently working on a software project as part of a course on Operating Systems Security and one of the features in my project is to detect bruteforce attacks on Windows hosts.
I know that I can easily accomplish this by checking for … Continue reading Detect bruteforce attempts on Windows 10 (without event log)
This is a question for operating system security experts.
We have an application using one platform/language, and it has to integrate with a library that uses another platform/language. There is no acceptable linking technology, and for un… Continue reading Child processes vs microservices for communication between components
About secure boot, I’ve visited intel’s website and they said:
The feature defines an entirely new interface between operating system and firmware/BIOS. When enabled and fully configured, Secure Boot helps a computer resist attacks and in… Continue reading Does secure boot protect you from infected BIOS/firmware?
Every now and then, you here a story about misuses of mobile OS’ spyware softwares, developed by technology firms which usually sell their products to governments or groups with similar power.
You here stories about Whatsapp calls, sms, im… Continue reading Why are mobile phones OS easily hackable (Pegaus & Co)