Skip to main content

Questions tagged [operating-systems]

The operating system is the software component that provides abstraction of physical hardware, and provides a generalized model for application software to execute without the need for specific hardware knowledge. Questions on the topic of operating system security should use this tag; you may also like to use one of the [windows], [linux] or [macos] tags.

Filter by
Sorted by
Tagged with
1 vote
1 answer
79 views

I'm very beginner in exploitation, I'm stuck in rather very famous why my exploit works in gdb but not in terminal? Context: I'm using Qemu emulator, using Qcow2 image of amd64 https://exploit....
nastya's user avatar
  • 21
18 votes
4 answers
4k views

I continually entered my password incorrectly whilst trying to login to Windows 11. I expected that after N failed attempts I would then start to see an increasing time delay after each subsequent ...
Pod's user avatar
  • 285
1 vote
0 answers
129 views

Let's say I am interested in using one of Microsoft's new computers but I have concerns over the massive amount of data, personal behavior, and whatnot being consumed by the machine. Microsoft claims ...
Kevin Connors's user avatar
1 vote
0 answers
106 views

For example, Meltdown and Spectre are serious security issues since they allow application to read unauthorized memory. However, from my understanding, most everyday computer setup allow any untrusted ...
EJam's user avatar
  • 119
1 vote
2 answers
227 views

I know the safest bet If I want to remain anonymous is having 2 separate computers, but I was curious if having 2 OS in different hard drives (both encrypted) but on same computer the same? Is the ...
Elias LP's user avatar
2 votes
2 answers
172 views

I am interested in standardizations for secure design and development of products, especially towards operational technology / IoT / ICS. My understanding of information security management systems ...
Nesuma's user avatar
  • 91
0 votes
1 answer
391 views

Is it possible to filter CVEs by affected platform/OS? Some sources do provide this, like exploit-db, but the main vulnerability source NVD, National Vulnerability Database, doesn't seem to have such ...
e-epsojn's user avatar
1 vote
0 answers
123 views

With OS detection enabled I noticed that the device fingerprints is running something entirely wrong. Is there another tool that I can use that can verify since something looks odd?
maye's user avatar
  • 11
1 vote
0 answers
107 views

I assume most of the security issues with old software are that scripts or .exe will run against the bugs in the software. and that the firmware on the device OS bugs aren't patched. Or some parts of ...
maskin's user avatar
  • 129
1 vote
1 answer
355 views

My environment has a variety of operating systems (Windows, Linux, etc.), servers and applications. Infrastructure scans are showing old versions of TLS that need to be disabled at the OS level, while ...
Fetus's user avatar
  • 143
1 vote
0 answers
146 views

I'm using the open source version of Tripwire on Ubuntu 22.04. Right now when a file is modified Tripwire will document this in the integrity check with an "Expected" vs "Observed" ...
Zzgooloo's user avatar
0 votes
1 answer
176 views

The question is mainly stated in the title. I was wondering what kind of attacks can be launched on such a setup, where someone has access to a running OS with locked screen (needs password for the ...
tur11ng's user avatar
  • 101
33 votes
1 answer
6k views

I have a machine that I suspect to be compromised and am installing a new OS from a usb. I know that there have been cases of malware surviving this, and even BIOS-reflashing, and something about the ...
CoolName's user avatar
  • 341
0 votes
1 answer
212 views

I want to migrate from Windows to Ubuntu. I understand that Ubuntu's1 security model is a bit different than that of Windows but I don't aim to ask about this particular OS, rather, in general, what ...
Arcticooling's user avatar
1 vote
0 answers
171 views

If the ISO file for an operating system is malicious, is it possible for it to overwrite UEFI code when booted (If secure boot is disabled)?
4389759843759's user avatar
18 votes
4 answers
5k views

I am having a discussion with friends and my point is that the older a feature-frozen operating system is, the fewer security bugs are left unpatched and therefore the cost for the company to fix them ...
FarO's user avatar
  • 343
3 votes
1 answer
294 views

This is a question for operating system security experts. We have an application using one platform/language, and it has to integrate with a library that uses another platform/language. There is no ...
fernacolo's user avatar
  • 254
-2 votes
1 answer
490 views

Every now and then, you here a story about misuses of mobile OS' spyware softwares, developed by technology firms which usually sell their products to governments or groups with similar power. You ...
Johnny's user avatar
  • 1
0 votes
1 answer
300 views

If you have full-disk (or a partition) encrypted, and your computer crashes, without the opportunity to re-encrypt the data (I'm assuming that happens with a graceful shutdown), isn't that a security ...
belkarx's user avatar
  • 1,376
0 votes
0 answers
1k views

Since Secure Boot authenticates software, the OS only needs to check hardware. The implementation I have in mind measures hardware and compares the result of the measurement to the value in an EFI ...
beroal's user avatar
  • 167
18 votes
4 answers
6k views

I've worked on places where the admins have disabled desktop personalization on Windows for settings like: changing desktop background and lock screen images local themes - no high contrast for ...
Bor's user avatar
  • 293
1 vote
4 answers
4k views

When I ask someone about Linux, people always say it's really safe and this OS doesn't collect your data and these are not spy operating systems. When I ask them "how?" they say, "...
The Epic's user avatar
1 vote
0 answers
678 views

My goal is to be protected against key disclosure laws and possible extortion. I know dm-crypt can be used to perform full disk encryption for GNU/Linux distros. However, it is not enough. I want to ...
Curiosus Hominem's user avatar
1 vote
1 answer
602 views

I'm interested in using GNU/Linux for different reasons. Partly for freedom, privacy, and security. But also to force myself to learn Linux. One issue I’ve found is that desktop Linux seems to have ...
arrakies's user avatar
1 vote
0 answers
242 views

Guys I need to install jdk 8 for my programs to work better, many programs do not support the version higher than Java 8 so I want to install Java 8 to run better, I tried to install via apt-get, but ...
Maria Eduarda's user avatar

1
2 3 4 5
9