Sorry for being so general, but I know my ISP logs connections to others and all. I’m just questioning whether they keep any physical data that was over a HTTPS connection. Learned about how ISPs also “packet sniff”, do they keep the data gained from sniffing packets when they want to overview the “log”?
They keep a log of data, so what can they see that was done previously data wise?
Thank you very much for your help <3
I’m trying to reverse engineer a set of PG databases into a Data Model. I’ve found everything I need to define all the sub-models, tables, columns and FK constraints, but can’t find anywhere that details whether the relation is 0:1, 1:many, 1:0..1 etc
I’ve looked in
pg_constraint information_schema.check_constraint_routine_usage information_schema.check_constraints information_schema.constraint_column_usage information_schema.constraint_table_usage information_schema.domain_constraints information_schema.referential_constraints information_schema.table_constraints information_schame.key_column_usage
but there’s nothing (obvious) which details the cardinality.
Does anyone know where this can be found?
As the title says, I thought that from MSSQL 2016 I don’t really have to drop or disable ColumnStore indexes before ETL and rebuild it after.
The store filled with only top-selling products provided by proven suppliers in China. Most of the processes are automated or at least semi-automated, so this store can be easily managed by everyone – no special skills required.
This store is based on WordPress and uses Woocommerce. This makes it very simple for managing the website even for a NEWBIE. And it’s much better than shopify because you don't have to pay anything for using the platform and its apps.
WilsonWatches.com Automated Dropship Store
If I want to access the Galaxy Store on a Samsung Galaxy phone I have to agree to a set of terms (Legal information). These terms are excerpted below:
All content made available to you by the Samsung Galaxy Store is subject to the terms and conditions set forth below…
In order to provide you with and further improve relevant services, the Samsung Galaxy Store accesses Phone, Contacts, and Storage. It also collections your device information (e.g. IMEI and model name) and service usage history…
I understand why it would collect “device information”, as any software downloaded and installed on your device would operate best if the software is tailored for a specific device/OS version etc. I assume these are the same reasons why a web page is given the operating system and browser you are using to access that page.
However can anyone give a good reason why Samsung would access my contacts? I’m not exactly comfortable with this, especially as I don’t see any reason for it for the purposes of making an ordinary app work. Also, when it says that it accesses my storage, does that mean that Samsung has access to my media stored on my phone? By that I mean documents, videos, photos etc?
Also I’m not sure if this question should be asked at another SE site maybe instead of here?
I have a new task to try to speed up one WordPress site. In order to do so, I copied the existing site to my company’s dev server. The problem is pages do not look quite the same. The code and DB are totally the same. After search I found that some theme settings and some fusion and toolset settings are not the same on prod and dev server. For example header width, fonts, custom.css is empty on dev (one that belongs to theme and can be edited from backend), etc…
What can that be? Do some of these components store data remotely and because of diff domain, I can not get that or I miss something else?
If a fingerprint scanner were a human it would probably be like this:
- take a photo of the finger presented for authentication
- check it against the original photo to determine if it’s the same.
This would lead to the problem that the process has a copy of the scanned finger and anyone stealing this then owns/pwns a ‘password’ of mine that I can never change. Obviously they may have other challenges in using that password, but they have it nonetheless, so if an opportunity arises they can use it.
I’ve stayed away from using my fingerprint scanner on my phone (FWIW Moto G5s) because I’m not sure whether it’s a risk like the above.
Is the data that real phone fingerprint scanners generate and store for comparison something that can be stolen? Or is it something that’s always going to be unique to that device – e.g. is it salted or such?
And if it is sensitive, do apps that use the scanner have access to it, or would that normally be left to the phone’s OS (Android in this case) and an app just gets back an un/authenticated response?
Asking because I’m trying to answer:
Does my phone have a stealable copy of my unchangeable fingerprint on it (e.g. attacker steals device, could get access to my fingerprint – or access to some data that would be enough to present as my fingerprint)
Does my phone’s OS have a stealable copy? I ask this because I’m wondering whether that means I’m trusting it to Google / Apple etc.
Do my phones’s apps have access to that? (obviously this vastly increases the vulnerability area if so)
I’ve looked online and I understand that scanners don’t usually store a photographic scan, but some key things that can identify unique properties, but if those unique properties are … unique … then they could be stealable?
No time and pain wasted to design a site, Because we made it for you! Fully set up and ready to take orders from first day. Easy to scale. Check these insane bonuses worth more than $ 3,000!
Get this amazing this deal before anyone else does. If you are interested in a Buy It Now offer, feel free to send a private message with your best offer so that we can negotiate on a price with a mutual agreement. Any reasonable offer will be taken into consideration.
Don't forget to visit our profile…
PREMIUM AUTOMATED Cat store: Winning Products/ $ 1,071 value domain name+Bin
I’m building a web application which configures and interconnects other applications through web services.
In all the data I have to save for each applications, there are some that are quite sensitive : the credentials.
Unfortunately, most of these applications do not provide dedicated API keys or token for this kind of usage, which means I have to store login, passwords of a technical users. And in some cases, client authentication certificates with their passwords.
These data must be accessible to users (as long as they have the permissions) in “clear text” because they can be updated. They also have to be in “clear text” to the server because we can reconfigure every application at any time with the data we want.
What are the options to protect the best we can these data ? Obviously storing them in “clear text” in the database doesn’t seem like a secure option despite being convenient.
I working on a setup where I’m getting users to scan their fingers for fingerprint at a local machine but, the templates are stored at a centralized server for efficiency reasons.
Since the verification SDK resides at the local machine, the server needs to send the template from database to the local machine for the SDK to match them.
I was wondering if this is a safe approach and if the fp templates are security sensitive information? All in all, the question boils down to the following statement, “Can ISO/ANSI fingerprint template formats be used to recreate fingerprints electronically or otherwise?”
Relevant paper: Reconstruction of Fingerprints from Minutiae Points