Questions tagged [Information security] (2300)

3
answers

Postgresql. User rights superuser. Access control?

Good afternoon. (1)it is Necessary in postgresql to limit access to a particular schema or table. It must be done so that the administrators of the DB, including owning the account superuser had access rights to this schema to read from it, etc., in General any rights she had. Access should only be provided for specific ro...
Willard asked April 19th 20 at 12:34
0
answer

How to redirect traffic via an intermediate server on the main and back?

we have two servers... intermediate: X. X. X. X, which is under the domain of the QQQQ.QQQQQ.QQ and main: Y. Y. Y. Y, which is a VPN Outline You need to redirect traffic via an intermediate server on the main and back. Do this: echo 1 > /proc/sys/net/ipv4/ip_forward iptables -A INPUT -m state --state NEW-m tcp -p tcp -...
Jarod.Brekke27 asked April 19th 20 at 12:23
5
answers

Is there a secure cloud?

Good day! I'm paranoid. I have nothing to hide, however, I would very much wish that someone had access to my data, at least to the media. Is there such decentralized storage(the cloud)? Icloud is checked. Google drive - checked. They themselves in their terms of use they write about it, though, and say that the data in t...
elwyn.Bahringer asked April 19th 20 at 12:21
4
answers

How to be with a Russian ip when trying to brute force?

There is a small news site in the city and consistently someone, but tries to match passwords from the admin panel, then FTP, ssh, all from foreign ip ban forever(for the subnets), then the conversation is short, but often come across Russian and are now in quarantine very often it is Russian, what to do with them? The owne...
kiara_Grim asked April 19th 20 at 12:12
2
answers

Why after you add certificates to the browser, it starts to slow down?

I had to add 10 certificates in browsers (Chrome and Firefox). It was necessary for one system online identification. Purely visually -then the opening pages began to slow down in both browsers. Why can this be? Maybe the browser tries to check the validity of certificates? no idea what was going on under the hood.
una.Bins asked April 19th 20 at 12:07
2
answers

How to create a white list to download OS Windows 10 / 2016+?

Good day, tell me how you can make a list of trusted files (the OS itself) and boot/run it ? Throw Wikipedia or who did share your experience.
karson_Mohr asked April 19th 20 at 11:56
1
answer

How to start a career in the specialty "Information security"?

Experts / specialists in the field of Information security, a question for You. Study on 1 course "Network security". Want to start earning and this looking for work. The work is, is not complaining. But I don't want to waste your time and energy on work which is not related to my specialty, or at least the IT sector is onl...
cristobal asked April 18th 20 at 13:28
3
answers

Is it possible to disable a webcam when you log in? How to protect from hacking a webcam?

Hi habrovany! Is it possible to disable the webcam whenever you log in to the system? Now every time I log on with a hot key turn off the webcam: But, I would like to automate this process. But at the same time, so you can always enable the webcam when it is necessary (very seldom use). Tell me how to do it? How to prot...
2
answers

The microphone on the computer is included permanently, how to stop it?

Before the microphone included on demand (when you run Skype or Recorder). And now... Discovered by accident by turning up the volume in excess of - appeared whistle (acoustic complication with speakers). He began to understand manipulations with the suppression of echo in the sound Settings and the Realtek HD Manager didn'...
Avery_To asked April 18th 20 at 13:22
3
answers

The best languages for cyber-security?

What YAP is often used in the field of information security? And is this for Java?
Hazle_Gaylord asked April 18th 20 at 12:54