Useful tips for everyday
Are there different types of TLS cipher suites? Different Windows versions support different TLS cipher suites and priority order. See the corresponding Windows version for…
Can I modify hosts file? Select Start > All Programs > Accessories > Notepad. Select File > Open. In the File name field, enter C:\Windows\System32\Drivers\etc\hosts.…
How does SSH find private key? By default, the private key is stored in ~/. ssh/id_rsa and the public key is stored in ~/. ssh/id_rsa.…
How do you bypass a certificate on a website? Select the options gear, then select “Internet Options“. Select the “Advanced” tab. Scroll down to the…
Why does my Mac keep asking me for keychain password? Your keychain may be locked automatically if your computer has been inactive for a period…
Is it possible to change the integrity of encryption? No. This is easy to see if you consider the one-time pad, a simple (theoretically) perfectly…
Can a data URI be used to perform XSS? This is our attempt to explore different ways by which data URI can be used to…
Are Google Forms secure for personal information? Yes, Google Forms is HIPAA compliant. Other HIPAA-compliant safeguards include encryption to protect sensitive information, user authentication, and…
How do you make a strong password for kids? What Makes A Strong Password? Length is key. Don’t use personal words. Don’t use common words…
How do you protect against slow HTTP attacks Nginx? To protect your Web server against slow HTTP attacks, I recommend the following: Reject / drop…