Skip to main content

All Questions

Filter by
Sorted by
Tagged with
1 vote
0 answers
436 views

What would be the security rationale for a hotel blocking only SSH traffic? [closed]

I recently stayed at a hotel where outbound SSH traffic (and seemingly only SSH traffic) was blocked on the guest WiFi network, and I'm trying to figure out what security-based rationale they might ...
Psychonaut's user avatar
0 votes
1 answer
183 views

What threats are mitigated by encrypted VPC connections?

We are running a virtual private cloud, in other words a vendor-hosted intranet. (In this case the vendor is AWS, but it could be Azure, Digital Ocean...) The intranet does not have public-facing ...
lofidevops's user avatar
  • 3,610
1 vote
3 answers
431 views

Installed some software over a public insecure wireless network -- should I consider myself compromised?

A couple months earlier, I made the mistake of downloading some software over an insecure wireless network and running it without checking its integrity. I am now considering reinstalling my system, ...
Demi's user avatar
  • 889
6 votes
4 answers
483 views

Worst case scenario of having the ability to remotely write files to disk as admin

I'm working on creating a program ("My Program") that will communicate with another program ("Their Program") via XML commands over a raw TCP/IP connection. Their program allows files to be written to ...
Matt's user avatar
  • 175