Questions tagged [software]
Computer software, or just software, is a collection of computer programs and related data that provides the instructions for telling a computer what to do and how to do it.
235 questions
2votes
1answer
83views
How much should we generally trust security-only support of a legacy version of a software and what should we look out for? [closed]
Many software vendors maintain old versions by providing security-only fixes. Some examples include: Android on Google Pixel Phones. Python. Firefox ESR. My understanding is that people are most ...
0votes
1answer
254views
Salvageable computer parts after being hacked [duplicate]
(edited) My question main is much pretty where can malware hide after it's infected your computer and what parts should I keep and throw away to make sure the infection no longer spreads. Does factory ...
15votes
7answers
5kviews
Choosing laptop brand for company
Recently we have been wondering whether it makes a difference (from a security and privacy perspective) what brand laptops should be used in our company. I have heard wild stories about backdoors ...
0votes
2answers
142views
Is it possible to make whitelisted software do custom, malicious things?
Let's say there's a keylogger secretly installed in an employee's computer. The keylogger recorded a bunch of information, but the well-configured firewall blocked the keylogger from sending that ...
-1votes
1answer
419views
bruteforce local software's password
There is a lot of online tools to bruteforce online server like hydra and offline with hashes like hashcat. Yet it seems very weird that there is not a single offline bruteforcing app for software. ...
1vote
0answers
92views
Where to find updated best practice on using unmaintained or legacy software on a patched OS?
I assume most of the security issues with old software are that scripts or .exe will run against the bugs in the software. and that the firmware on the device OS bugs aren't patched. Or some parts of ...
-1votes
2answers
690views
Is end-to-end encryption really secure?
If a software uses end-to-end encryption and the encryption key of a client never leaves the device, isn't it still relatively "simple" to get the encryption keys of clients? A hacker just ...
4votes
1answer
475views
Is it possible to see the previous contents in a word file?
I have a word document where I have turned off the tracking history so technically no one could track my previous changes. What if I send the word document via email? Could someone possibly use a ...
0votes
1answer
130views
Are computers exposed when software is installed on a system?
As a neophite in security, I'm very curious to understand if companies can audit computers that their software is being installed on during the installation process, and report back to their servers? ...
0votes
1answer
341views
Need secure site substitute for printfriendly.com [closed]
At the present time, the website "printfriendly.com" is not available in my work environment. I had submitted an appeal to our helpdesk to have this site reviewed. Their response: That site ...
1vote
0answers
108views
Does Google Update perform cryptographic checks against releases?
My company is looking to allow Google Chrome to self-update, a necessity as we are finding it difficult to keep up with their release cycle in order to mitigate vulnerabilities. On the pro side, ...
0votes
0answers
28views
Is using free product key or license key safe [duplicate]
I have installed VMWare Workstation Pro from the official website. Now after the trial version has ended, I have searched for free products key on the internet. If I use these product keys, will it be ...
1vote
0answers
731views
Do anti-cheat software actually "patch" the UEFI firmware on your motherboard?
I've recently read about the new game called Bloodhunt containing an Anti-Cheat, which had a bug, in which the anti-cheat service would stay installed even though the game is removed. The top Steam ...
4votes
1answer
2kviews
How to maintain and enforce an approved list of software?
I work in a software-development company where we have a lot of tech-savvy people. For ISO27001 certification we need to maintain list of approved software. And I'd like to understand how in practice ...
0votes
1answer
2kviews
Some introductory reverse engineering help on finding a string
I understand the crackme I am researching is from 2007, however this was the point in my life when I initially became interested in reverse engineering and wish to complete it for nostalgia sake. ...