decryption
hi is there anyone know how to decrypt the wordfile with have 8 passwords that have symbols, lowercase,uppercase and digits with a more faster way, bcos now I am using hashcat and require very long time to decrypt😭
HIPAA/Software
Was just wondering if a piece of software that is not HIPAA compliant because of an AI feature. If you were to block the application from having an outbound connection (with a firewall rule), could that then be considered HIPAA compliant? Provided BAAs and all that other stuff. I'm just wondering specifically about the control measure and it's efficacy for HIPAA compliance
i need help with PE
i am not successful and there is no solution for this on google.
if anyone wants to try the machine send dm.
this is easy-medium level...
hacked
im just going to get top the point someone told me to download a game he made and i said sure i checked for viruses and it said no viruses was on it so i opened it to my surprise it didint work and i couldn't use anything on my computer so i changed my google discord and roblox bc he was going for it people that i knew were getting blocked and my name and profile pic changed
how can i make a own vpn for safety and data not shared with any companies
how can i make a own vpn for safety and data not shared with any companies and i want to make a vpn server and vpn soft which location will be anonymous locations , america , korea , china etc locations . how to make this ? as a ethical hacker . i just want to hide from black hat hackers cuz i am a ethical hacker .
Question about Aggressive Mode with Pre-Shared Key
A friend of mine is applying for a small business loan and they had to agree to a cybersecurity audit. It's really nothing more than an external pentest from an online provider. One of the dings that came back was that they use a VPN that supports IKE, aggressive mode with a Pre-Shared key. I took a look at his setup and the results are accurate. It was a lower risk (2 out of 5) on the pentest scale, and I don't think they will make much of it, but I would like to know more about the actual...
My Uncertainty about Career Planning
Hello friends! I was interested in the field of cyber security. I started university this year. But now it is said that job opportunities are very difficult. Frankly, I'm not sure about my field. Can I get your opinion on this? How can I find the most suitable field for myself? I guess it will be in the IT field.
the question
For every file moved to the Recycle Bin, two new files are created in the Recycle Bin.
Both files start with $R.
Group of answer choices...
PCIe to 2 NVMe m.2 Adapter on non PCIe Bifurcation Motherboard
I would like to know if anyone knows of an adapter that can support 2x NVMe m.2 drives that goes into a pcie slot on a mobo that does not have PCIe Bifurcation. I have been shopping around and can't seem to find one.
Blocked Ports Still Show up on Nmap?
Btw I apologize if I sound kinda stupid, I'm not new to cyber security as a whole but I don't have much knowledge of the topic and how stuff works, but anyways; I was pen testing today and found open, vulnerable, ports on Nmap (those being 135, 139, 445, 53, 80, 443, and some other random ones), and on my Windows Defender Firewall settings I made inbound rules to block connections to those ports, but after running Nmap again, as well as "netstat -ano" the ports I thought I had closed were still in fact open (according to Nmap), and listening on cmd.
Is this normal? Is there something else I need to do to ensure my ports are closed?
Thanks for your understanding and your help!...
Need help
Having a brain fart trying to answer this question... any help would be great. Thank you
What file, object, rodent, or binary is being transferred to this active, listening process?...
cyber security
Hello I need help with my lab that says challenge on it I tried doing this and got errors so please help me with this as soon as possible pin me thank you
Host Name resolution
I am having a project in security for host name resolution but the main problem my code is facing is that it dosent resolve android phone (idk why) do you have any idea which protocol would help me resolve those? Also for routers I just want to know the product name? So is vendors list of mac addresses abailable online? I mean its easy to find out mac address so just printing vendors name wld be great for me.
i need a person that can help me on my cyber security class please pin me on dms if you are helping
me with my class thank you
XSS injection question
I’m creating a very simple website that will use ChatGPTs api. I want to display the content I get from the api in a nice looking way so I figured I could just have ChatGPT add html-tags.
However I came to realize that to display what I get back I need to set the response to “safe”. I e it just runs it, this is as I’ve come to understand a risk for XSS injection.
How big risk is this? I feel like there’s not very likely I’d get bad code from the api but I cannot say that for sure....