Per the Sequential Access Theorem we can access every node of a splay tree in $ O(n)$ time, when accessing the nodes in a specific order.
Given a link/cut tree, is it possible to access all of its nodes faster than the naive $ O(n \log n)$ amortized time in the worst-case?
Is there any way an untrusted third party who has access to content from a website over HTTPS can prove the authenticity of the data (i.e. that it was distributed by a server in possession of a specific TLS private key)? The way TLS works makes it such that a packet capture and copy of the master key is insufficient to prove authenticity, since the HMAC key is derived from the master key, which makes it possible to forge the message. Because the third party is untrusted, having them verify the TLS themselves then endorse the authenticity by digitally signing the material is not a solution either.
I’m pretty sure there is no solution under these constraints, but there may be something I missed.
I’ve recently became baffled as to how often is there an attempt to use a web-camera on my laptop. And I mean – out of the blue, when I had neither an intent nor a context to use it.
How do I know it’s used? Well, I have an AV which has a function “block usages of a device X” (X can be a microphone or a web-camera for instance). And when it does so, the popup shows “oh, look, user, web-camera access is blocked!” Also, to explain what do I mean “I noticed recently”: it’s that I enabled this feature in the AV recently. I suspect all these things were happening even before, but I just didn’t know about them.
Unfortunately, the AV doesn’t provide a way to see what was accessing the camera. And here’s the main problem – it all happens in seemingly “harmless” situations. Examples?
- I launch a web-browser after restarting a PC – alert, web-camera access
- I launch Steam? Alert
- I open a tab in youtube the first time (!?) Alert.
So far, I use tape.
But clearly there should be better ways to do this which allow legitimate usage.
- Windows 10 PC (laptop)
- Kaspersky AV
- AV doesn’t show any problems (such as viruses)
- Network monitoring doesn’t show any suspicious traffic
- Should I even concern myself about these usages?
- What can I do to absolutely ensure it’s not used without my consent?
- What kind of information is it possible to leak through this, is it really possible to remotely enable the camera and shoot the user?
I connect to the Internet via a neighbor’s wireless router (not a guest connection).
Windows 10: I don’t share files or printer. Domain, private, public network: firewall is on. Scan = no issues.
I have a G Suite account to build sites. Site is published. Sharing options are secure. No other authorized users at this point.
Support asked for the URL of site builder in edit mode.
Two days later, many unauthorized changes to published Google site. Is it possible for admin of neighbor’s network to access or edit site if it’s in edit mode?
Is it possible for the support person to use URL to access or edit site IF I have the site open in edit mode? Obviously, I can pull up the site in another browser screen, so wondered why support person with the link would be unable to do so.
Attempting to keep up with all the crazy, strange changes is eating my lunch. Need to ID the origin.
I have a WordPress site running as a Docker stack.
If I access it directly through DNAT (using a valid IP address just for this site), everything works well.
If I try to access it through Traefik (so I can share a valid IP address with other HTTP services), I can only access the home page of the site and WordPress admin pages for this same site but for all other regular pages I get a error message like this:
Unable to connect
Firefox can’t establish a connection to the server at 192.168.109.236.
The 192.168.109.236 IP address is the address of the Docker worker configured as a backend for this site in Traefik as you can see in this traefik.toml snippet:
[file] [frontends] [frontends.site] backend = "site" [frontends.site.routes.site1] rule = "Host:www.EXAMPLE.com,www.EXAMPLE.com.br,EXAMPLE.com,EXAMPLE.com.br" [backends] [backends.site] [backends.site.loadbalancer.stickiness] [backends.site.healthcheck] path = "/" interval = "10s" [backends.site.servers.c1] url = "http://192.168.109.236:9003" [backends.sita.servers.a1] url = "http://192.168.109.233:9003" [backends.site.servers.a2] url = "http://192.168.109.219:9003"
How to make WordPress links point to site URL instead of Docker worker’s IP address when being accessed through Traefik?
I have created my own logging in a PHP script on my website. While doing this, I record a timestamp, IP address and HTTP referrer. I notice that I often have two hits as follows where it looks like an iPhone and a Mac are accessing my site at roughly the same time from the same IP address. Can someone explain what is happening here?
[‘2019-06-23 02:47:26pm’, ‘172.117.xxx.xxx’, ‘Lakewood, California, United States’, ”, ‘Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/605.1.15 (KHTML, like Gecko)’]
[‘2019-06-23 02:47:28pm’, ‘172.117.xxx.xxx’, ‘Lakewood, California, United States’, ”, ‘Mozilla/5.0 (iPhone; CPU iPhone OS 12_1_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0 Mobile/15E148 Safari/604.1’]
[‘2019-06-23 03:09:04pm’, ‘95.44.xxx.xxx’, ‘Drogheda, Louth, Ireland’, ”, ‘Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/605.1.15 (KHTML, like Gecko)’]
[‘2019-06-23 03:09:07pm’, ‘95.44.xxx.xxx’, ‘Drogheda, Louth, Ireland’, ”, ‘Mozilla/5.0 (iPhone; CPU iPhone OS 12_1_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0 Mobile/15E148 Safari/604.1’]
I only have the one device and would be willing to consider paying for a service.
Once the user enters the form data the data is sent to the excel file. At the moment I am using Apache on Xampp to make it work locally on my laptop. I want to figure out how can the form be accessed from anywhere in the world in my company by any user and that data stored in the excel file on the PC having the excel file.
I keep my client data in a password protected Excel file.
For added security, I would like to block access to this file from potential hackers on the Internet.
Is it possible to block access to a file from the internet?
I can only see how to block a program with Windows Firewall, not an individual file.