I would use validate_username to protect username and other inputs from tags, octet, and others filters and conditions from sanitize_user but these functions only remove these dangerous chars and does not warn the user to not use these chars.
Does it exist a wordpress function of the same kind as validate_username that allow to warn and restrict user to use the same chars and conditions than those used in validate_username function ?
Could you help me to write a regex which fulfills the same conditions as validate_username to display error if one of conditions is positive.
And how I must do to add this regex |%([a-fA-F0-9][a-fA-F0-9])| to this one /^[A-Za-z0-9]$ / I don’t understand the use of | and / . In php.net this | is use to say "or" . For example this /^[A-Za-z0-9]$ / does not take into account octet (or exadecimal ?) as it define here : WordPress sanitize_user/
Knowing that hackers always discover solutions to hack what is to date the best solution to protect a registration and login form. If this last question is duplicate could you please post the link of existing response ?
so we connected our domain with HubSpot CMS. They only support SSL for subdomains, so when someone does not type in "www." they are prompted with a security warning. They told me I needed to set up a redirect through GoDaddy for it to always go to the root domain (
In GoDaddy’s forwarding section I see one that says "Domain" and the other says "Subdomain".
What do I type in each of these boxes so that my site goes to
https://example.com no matter what someone types in?
As is, no traffic, no revenue.
Our group is a non-profit (most of us are volunteers) with a limited budget doing community awareness on the topic of safe technology use to support health and safety.
We are looking for a project management platform that is safe, secure (data encrypted?), and has a good track record of not having any past security breaches. We need the platform to organize our meetings and activities, as well as facilitate our information and document sharing.
We are looking for project management platform options that have measures in place that would make it difficult, if not impossible, for others to steal information/documents and/or take note of what we are doing/sharing.
Any suggestions on where to look?
One way to secure a password in the database is to hash it with salt i.e. appending a random string to the password and then hash it and store the value.
Does encrypting the
password || salt then hashing it make it more secure? Is it really necessary (or can I skip the encryption part)?
in the AMP Docs, the following snippet is given:
Origin header is set:
If the origin does not match one of the following values, stop and return an error response:
the publisher’s origin (aka yours)
where * represents a wildcard match, and not an actual asterisk ( * ).
Otherwise, process the request.
Origin header is NOT set:
- Verify that the request contains the
AMP-Same-Origin: true header. If the request does not contain this header, stop and return an error response.
- Otherwise, process the request.
What I don’t understand is how the
AMP-Same-Origin header provides a form of security.
Couldn’t anyone provide an
AMP-Same-Origin: true header in a browser missing the
Origin header and skip CSRF protection even if it’s not on a trusted AMP CDN?
I’ve been using OpenVPN and SSH tunnels for a multitude of scenarios over the years and recently I’ve been earning a lot of buzz around the simplicity and security of WireGuard. Now I’ve found some troubling information about CVE-2019-14899:
An attacker that controls your L2 link (i.e., your WiFi or LAN) can send specially crafted packets to your device. The attacker can then use those packets to actively probe for certain properties of the TCP connections originating from your device. In other words, by controlling a device’s access point to the Internet, an attacker can infer if the user is connected to a specific host and port.
Additionally, if a TCP connection is unencrypted inside the VPN tunnel (if you visit a page that uses HTTP instead of HTTPS, for instance), the attacker can inject packets into that specific unencrypted stream. This would allow an attacker to feed your device fake HTML content for that particular stream. That would be dangerous, but as previously stated, the attacker must target a specific TCP connection, so it is not a simple vulnerability to exploit.
- Is this information technically correct?
- Some sources on the web also state that anyone controlling the WAN of the server will also be able to take advantage of this flaw. Is it true? Can the server’s ISP exploit this?
Assuming the information is correct:
- Why does it matter if the "TCP connection is unencrypted inside the VPN tunnel"? In theory one uses a VPN exactly to go around this issue – to make sure nobody can see the contents of the communication between two machines;
- If anyone controlling the client’s LAN can inject packages, how is this even considered a secure protocol? From my understating authenticity validation is a must in scenarios like this. The server should be able to check the authenticity of new data instead of blindingly accepting it… Isn’t there some kind of key exchange for this?
- According to Wireguard’s website "mimics the model of SSH and Mosh; both parties have each other’s public keys, and then they’re simply able to begin exchanging packets through the interface." How is a 3rd party (that doesn’t have the right keys) able impersonate the client, send data and then how the server decrypts it using the client’s real key without errors?
It look to me like the information about the CVE isn’t correct OR WireGuard was so badly designed that it can’t even use a proper key exchange to secure a communication channel.
Thank you in advance.
Given how UEFI secure boot appears later than TPM, i had assumption that it provides advantages over TPM.
As i read into each, it appears to me that the TPM measurements to each stage would provide about the same level of integrity guarantee as how each secure boot stage verifies the next stage’s signature.
I get how the UEFI secure boot’s key/certificate structure may have management advantages over TPM. However, i have trouble finding security advantages against attackers. Can someone enlightens me if those statements would be valid? Thanks!
I can copy and paste between my iPhone and MacBook Pro it’s a great feature that I find myself using frequently. I am frequently copy and pasting from my password manager to log in to different sites. a few questions about the security of the cross device cut and paste.
- Does apple get access to the clipboard?
- How is apple securing this cross device copy and paste?
- Can this feature be turned off?
- Should I turn off this feature to improve my security?
pass a real alternative to Keepass in terms of security?
While Keepass has its own built-in encryption,
pass relies on GPG to secure your passwords. GPG is obviously recognized as providing excellent security for transferring data over insecure networks, when the threat model is a MITM. But is GPG still a reliable way for securing local files on your computer? Keepass goes to some length to thwart potential attack vectors, such as making typed passwords harder to get with a keylogger and protecting its memory. Is
gpg agent more or less secure?
Also, if the private key which decrypts your passwords is just a file on your computer, is it really secure? I guess you can simply put a passphrase on the key, but I get the impression that it’s dangerous for someone to get your GPG key even if they don’t know the passphrase. Besides, Keepass has additional features like using a key file to unlock. Is there a security benefit to Keepass’s approach over