batman
- ne znam, sve sta citam na netu kaze da se privatni kljucevi ne trebaju mijenjat cesto, pogotovo ako su dulji od 2048 bitova jer su trenutno “uncrackable”, ja sam u ispitu napisao da se cesto mijenjaju javni zbog toga sto cesce dolazi do promjene kadrova i pouzdanosti u te iste ljude, a internet kaze svasta, medu ostalom i ovo https://security.stackexchange.com/questions/85963/what-is-the-purpose-of-frequently-rotating-tls-certificates-without-changing-und
- zato jer ima otvorene rekurzivne posluzitelje (idk sta je to) al internet kaze ovo
Responses sent for DNS queries are larger in DNSSEC due to additional fields and cryptographic information used to verify records. The larger responses can allow an attacker to attain as much as 70 times the attack volume with the same bandwidth, compared to regular DNS.
Internet security personnel can enforce several countermeasures that reduce the threat of DDoS amplification, including ingress filtering, limiting response rates, and limiting response sizes.
- ja bih pogledao u CRL novog certifikata izdanog od istog CA i vidio jel valja, alternativno u javom imeniku
- ne radit open source aplikacije i sakriti gomilu funkcionalnosti u pozadinu? https://stackoverflow.com/questions/6481668/protecting-executable-from-reverse-engineering
- phishing, nigerian scam i sl., last minute ponude… nez sta jos ako se misli da je i sifriranje kompromitirano
edit: mozda Client-Side Attacks
The attack vectors for internet users are increasing day by day. A link containing malicious content can be enough to capture a computer alone. The e-mail service components’ security must be strengthened, and necessary anti-phishing solution such as employee training or email threat simulating etc. must be conducted against threats.
Browser Exploit Kit
E-mails that contain known vulnerabilities of Internet browsers cause identity theft, data leakage and access problems. Sometimes a link may contain an abused piece of code. In this case, the e-mail service and the security components must provide defensive measures
Zna li tko ovo: Kako detaljno funkcionira “mac flooding” tj sta se dogada u switchu i njegovoj tablici da bi presao u hub nacin rada