Questions tagged [Information security] (2300)

4
answers

Is it possible to use the user's IP address on the server to identify the location?

Create weather widget for Wordpress themes sold on themeforest. Get GEODATA(location of the ISP server) client IP service via IPAPI. Will there be any problems with IP, which generally policy says about this?
2
answers

A DOS attack via GoldenEye and xerxes in Kali, hangs the PC, why?

Has anyone worked with these utilities? The website(test, of course))) puts, but it does not go beyond - the PC hangs. Why? Not enough RAM? Is it possible to defend against such attacks without the involvement of services such as Qrator, CLoudflare?(the answer is open, where any config files to edit, how to configure ITU or...
Misael asked April 2nd 20 at 17:39
2
answers

See if the provider the fact of using Tor?

And if he sees how to do not seen? VPN bump to the input node of the Torah?
Deven5 asked April 2nd 20 at 17:39
8
answers

I suppose that for me applies SORM. Is there a common web interface for data access SORM?

I have serious suggestions that against me applies SORM for several years. I would like to see all of the data collected by SORM. I think they shared.
elyssa_Berge asked April 2nd 20 at 17:37
1
answer

As with nginx to block URLs with duplicate slashes in the beginning?

Good day! The question probably simple but I can't find the answer. Help, please! As with nginx to block queries of form: // //index.php ///index.php ///that there How is this I don't understand, apparently bot what is. In browsers it is not possible to repeat... Is DOS Asian server in the Netherlands. Nothing serious, but ...
Alta29 asked April 2nd 20 at 17:22
2
answers

SSL and security requests?

I have a domain And SSL certificate. And have a domain B with a completely different SSL certificate. Will the queries be safe from domain A to domain B?
Jasmin_Ankunding asked April 2nd 20 at 17:14
4
answers

Which of the courses pentest to choose?

Hello. Working as a system administrator and very interested in the topic of information security, particularly penetration testing. Found a variety of free resources, books to study, pass the job to ctflearn.com but questions still remain. Thinking about taking core courses. For reviews found several courses for beginners ...
fern asked April 2nd 20 at 17:11
2
answers

What are the methods for penetration testing? Which is better for PCI DSS?

the answer with references. interesting advantages of one or another technique for card standard
obie.Olson1 asked April 2nd 20 at 17:07
1
answer

In any standard(international, standard) specified on conducting a pentest?

Ie indicated the desirability of its holding. In GOST 56045 is there. And where is there more? Can be NIST, CIS Controls, OWASP? Preferably with links.
narciso asked April 2nd 20 at 17:07
3
answers

Secure email for the lazy in a virtual machine?

Suppose I do in my personal computer, in a virtual machine, some sort of Linux. I will use it only to check email. mail, with the saved passwords in the browser. Questions: 1. Much will increase the security of my mail? Makes sense to do it or the effort is not worth it? 2. Or have to do input/output in the mail. 3. Or...
Sister46 asked April 2nd 20 at 16:58