security

Android KeyGenParameterSpec.Builder ignoring setCertificateNotBefore and setCertificateNotAfter when not in Secure Hadware

ε祈祈猫儿з 提交于 2020-06-01 05:02:41
问题 I've created the following method that creates a KeyPair and logs the Certificate details: @RequiresApi(api = Build.VERSION_CODES.N) public void createRSAKeyPairtWithChallenge(final String alias, final String attestationChallenge) throws NoSuchProviderException, NoSuchAlgorithmException, InvalidAlgorithmParameterException, KeyStoreException, CertificateException, IOException { Calendar start = Calendar.getInstance(); Calendar end = new GregorianCalendar(2025,03,24); KeyPairGenerator

AWS security groups between accounts

 ̄綄美尐妖づ 提交于 2020-05-28 08:43:00
问题 We have two AWS accounts, one for dev and another for prod. Long story short we have a singular database used by services in both accounts which is in prod account. The problem arises when dev services try to access database in prod. Currently, we just add dev services IPs to prod database security group, but that's no longer an option. Is there a way to add dev services security group to prod database security group (cross account)? 回答1: It's possible to peer the two VPCs across two accounts

AWS security groups between accounts

生来就可爱ヽ(ⅴ<●) 提交于 2020-05-28 08:42:16
问题 We have two AWS accounts, one for dev and another for prod. Long story short we have a singular database used by services in both accounts which is in prod account. The problem arises when dev services try to access database in prod. Currently, we just add dev services IPs to prod database security group, but that's no longer an option. Is there a way to add dev services security group to prod database security group (cross account)? 回答1: It's possible to peer the two VPCs across two accounts

How to prevent public access to Compute Engine External IP Address?

冷暖自知 提交于 2020-05-28 07:36:04
问题 I need to prevent users from accessing the site through the External IP Address on Compute Engine, they should can access site only via domain name (www.some-domain.com), not the IP Address itself. Let says the instance's IP Address of the Compute Engine is A.A.A.A. I am using Load Balancer to redirect it to secure connection, with these settings: Frontend HTTP : B.B.B.B:80 HTTPS : B.B.B.B:443 Backend Redirected to the active instance And I pointing the DNS (A) to B.B.B.B. Now, I am able to

Is it insecure to include your login page in your single page application?

佐手、 提交于 2020-05-27 04:19:44
问题 My understanding is that, if you include your login page in your SPA, then the user is receiving all of your code before they're even authenticated. And yet, it seems to be a very common practice. Isn't this incredibly insecure?? Why or why not? 回答1: An SPA would have all the page structures (html and javascript code for the design of pages), but obviously not data. Data would be downloaded in subsequent ajax requests, and that is the point. To download actual data, a user would have to be

Is it insecure to include your login page in your single page application?

孤街醉人 提交于 2020-05-27 04:19:05
问题 My understanding is that, if you include your login page in your SPA, then the user is receiving all of your code before they're even authenticated. And yet, it seems to be a very common practice. Isn't this incredibly insecure?? Why or why not? 回答1: An SPA would have all the page structures (html and javascript code for the design of pages), but obviously not data. Data would be downloaded in subsequent ajax requests, and that is the point. To download actual data, a user would have to be

How to detect a zip-bomb with Java 10

痞子三分冷 提交于 2020-05-25 17:12:10
问题 Apache POI is opening zip-files on a regular basis because Microsoft Excel/Word/... files are zip-files in their newer format. In order to prevent some types of denial-of-service-attacks, it has functionality when opening Zip-files to not read files which expand a lot and thus could be used to overwhelm the main memory by providing a small malicious file which explodes when uncompressed into memory. Apache POI calls this zip-bomb-protection. Up to Java 9 it could use some workaround via

Prevent reverse engineering of ionic application

半腔热情 提交于 2020-05-25 07:03:31
问题 Is there a way to prevent reverse engineering of ionic mobile application? As mentioned in Android forum I've activated proguard and built the application in eclipse. A file called proguard was created in my bin folder. It contained something like this view AndroidManifest.xml #generated:6 -keep class com.fg.lolc.CordovaApp { <init>(...); } But I still could reverse engineer the app and I was able to get the code from my APK. Is there a way to prevent this and improve the security of the

zsh: no matches found: requests[security]

≯℡__Kan透↙ 提交于 2020-05-21 03:03:19
问题 I am trying to run a python urllib2 script and getting this error: InsecurePlatformWarning: A true SSLContext object is not available. This prevents urllib3 from configuring SSL appropriately and may cause certain SSL connections to fail. For more information, see https://urllib3.readthedocs.org/en/latest/security.html#insecureplatformwarning. After googling the error the solution, on stack overflow is to download requests' security package: pip install requests[security] But when I run that

Client access to Superglobals

Deadly 提交于 2020-05-17 03:04:40
问题 PHP Superglobals behave in different ways and I'm never sure about which one to use. When can the client (I'm not talking about hackers or security attacks, but " normal users ") edit, create or access a Superglobal variable? Even php.net documentation does not talk about this fact. Basing on what I've learnt so far I can summarize them in this way: superglobal read create edit $_GET V V V $_POST X V X $_FILES X V X $_SESSION ? X X $_COOKIE V V V I'm not talking about your PHP script which