Questions tagged [protection]
181 questions
2
votes
3 answers
Copy protection in SD cards
I have created a map for using with GPS devices. The map is copied to a microSD card and then, GPS can read the map data from the card. How can I create copy/clone protection of my data on microSD cards? Because my business depends on it.
GPSmania
- 29
- 1
- 1
- 3
2
votes
2 answers
What steps can I take if I know that someone [Government, Special agents,..etc] is spying on me?
If I know someone is trying to spy on me, and they are tracking me both online and in the physical worls, what steps can I take to neutralize the risk? Keep in mind that I'm a normal person with limited resources.
These steps come to mind:
Set up &…
MaskedUser
- 39
- 5
1
vote
2 answers
How does software developer protect their code against binary patching?
Supposing we have a software that checks on a remote server online if the input entered by a user (a license key) is valid.
The server sends in a socket to the client True or False if the license is correct or not.
In the binary, a jump (jz...) is…
Duke Nukem
- 717
- 3
- 10
- 21
0
votes
1 answer
Can attackers substitute/place my queries to/from provider?
Can attackers substitute/replace my queries to/from provider? I mean I do HTTP query and its modified on provider-side so query goes modified to a server or reversal situation, when I get modified answer from server by the modifying response on…
Dmitry
- 123
- 1
- 1
- 5
0
votes
0 answers
Should I add protections where I dont understand how hacker can break system?
Lets say there is AJAX application where user can submit items - buy them.
And there was a code
IF ($_POST[items] > 20) {
echo 'error';
}
else {
do_buy($_POST[items]);
echo 'success'
}
So there is a check if items is not more than 20,…
Darius.V
- 352
- 1
- 2
- 10
0
votes
2 answers
Heads firmware and OS is more secure than Whonix, Qubes or Tails?
Developers stated Heads combines physical hardening and flash security features with custom Coreboot firmware and a Linux boot loader in ROM. This moves the root of trust into the write-protected ROM and prevents further modifications to the bootup…
user77680
- 105
- 5
0
votes
1 answer
What is LinkedIn's "email challenges" feature?
A LinkedIn blog post about the recent password dump says:
We take the safety and security of our members' accounts seriously. For several years, we have hashed and salted every password in our database, and we have offered protection tools such as…
Mr. Bultitude
- 349
- 1
- 3
- 10