
Unable to completely enforce password policy - Information …
2016年3月6日 · Stack Exchange Network. Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Does an ISO27001 audit require users to reveal their passwords?
2017年3月9日 · Say you have an internal password management system that encrypts at rest, encrypts in transit, audit logs access and enforces restricted access ... this is a 27001 acceptable method of password handling. 27001 audit says you need to share a password with someone, it goes through that. So, sort of passwords that you should be sharing?
OpenSSH declares ssh-rsa deprecated. What do I do next?
Later OpenSSH release notes are even more explicit that Joseph's answer is correct. See this from v8.7:. Note that the deactivation of "ssh-rsa" signatures does not necessarily require cessation of use for RSA keys.
How do you discover what permissions an AD group has, if you …
2011年6月13日 · Now, a little about solutions: There are several tools to collect different parts of the above lists, e.g. @Ian's answer using powershell scripts to collect folder ACLs.
Amazon Web Services - Relational Database Service - Security Scan
2015年3月6日 · Despite this we currently have a request from a customer to comply with a security audit of our systems. Included in this audit is a database security scan. However, the only available scanning tool in the AWS marketplace is Nessus which is only capable of scanning EC2 instances that are not micro or small.
Information Security Stack Exchange
Q&A for information security professionals. Stack Exchange Network. Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
XKCD #936: Short complex password, or long dictionary passphrase?
2011年8月11日 · Here is a thorough explanation of the mathematics in this comic: The little boxes in the comic represent entropy in a logarithmic scale, i.e. "bits".
What could someone do if they knew my MAC address?
MAC addresses aren't particularly sensitive, and are only available in your local network. The MAC address isn't available once the traffic leaves your local area network, although if you're using IPV6 your IP address may be based on the MAC address.
password complexity policy for non "English" passwords
2012年7月17日 · Most drive-by password cracking attempts are going to assume that the password is a subset of ASCII characters.
How can I track executed PowerShell commands within a network?
2018年2月20日 · Stack Exchange Network. Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.