Skip to main content

Questions tagged [identification]

0 votes
1 answer
104 views

I use NICE-DCV and using this as a realistic example to ask my question - upon connecting to a session on the server which is RHEL-8 from a client win11 pc, the client pc gets this security popup {I ...
ron's user avatar
  • 453
17 votes
4 answers
5k views

Since my ISP uses NAT, I will share the same public facing IP address with other customers. If I go to a website and perform an action (posting a message, uploading an image, etc.) then my IP address ...
cantsay's user avatar
  • 281
1 vote
1 answer
158 views

We have received an electronically signed GDPR data request from a person who has only provided his name and surname. We wanted to be sure that this person is who he claims he is, so we have asked to ...
ZygD's user avatar
  • 279
0 votes
0 answers
190 views

I will be publishing a fingerprinting app that shows its user how much access to their Android phone's identifiers it has. I haven't started writing it because I need to understand how can any Android ...
CurtisB's user avatar
  • 43
0 votes
1 answer
2k views

Yesterday, a ransomware hit my PC. I didn't pay the ransom and didn't comply with what the attackers were asking for and I wiped everything and every drive on my PC and then reinstalled my stuff from ...
newly-arrived guest's user avatar
0 votes
1 answer
1k views

I am assisting another Data Scientist with helping a bank detect and prevent fraud via data analysis and predictive modeling (Machine Learning). It's a challenge because the proportion of known ...
Hack-R's user avatar
  • 193
0 votes
1 answer
804 views

How is the malware file signature generated? Does it use a sequence of bytes in the beginning, size, PE (export, import, section), etc? And can the MD5 or SHA256 be considered a file signature for a ...
0xh3xa's user avatar
  • 113
1 vote
1 answer
187 views

During my work day, I came upon a website that had a popup that identified the company I work for(basically saying "contact us X company"). This website was never previously visited, cookies ...
Joe's user avatar
  • 11
1 vote
1 answer
3k views

If one uses a FAT32-formatted USB stick on Windows, Linux, or Android, would there be a way to determine on which computer the USB stick was used by examining the USB stick? I know OS can log which ...
William's user avatar
  • 21
3 votes
1 answer
1k views

I am building an application where one user (User A) can store a "query" of another user (User B) that may or may not exist in the system. This query can be done by email address. The ...
Mike-E's user avatar
  • 185
0 votes
0 answers
241 views

How reliable is a mathematical model of a human fingerprint for identification? I am looking for a way to uniquely identify individuals that is very reliable and easy to use that does not require ...
polcott's user avatar
  • 93
0 votes
1 answer
278 views

Currently there is this design of two apps that work together: Proof app: On customers phone, takes in a textcode and creates a QR code Scanner app: On hosts phone, Scans the QR code and displays ...
Dennis Jaheruddin's user avatar
3 votes
1 answer
2k views

Recently I've had two nonprofit organizations ask me to email them a photo of my driver's license. No money is changing hands, and both of these are legitimate and well-known nonprofits. Organization ...
user avatar
1 vote
1 answer
1k views

I need some help to understand my problem. I'm studying a way to provide authentication for my applications. My scenario: I have a set of APIs with restricted access and users that will be ...
Simio's user avatar
  • 11
0 votes
2 answers
395 views

I'm curious what the current state of author recognition software is, i.e. software that detects the author of a certain anonymous text based on a certain pool of texts obtained from elsewhere. This ...
Sebastiaan van den Broek's user avatar

15 30 50 per page
1
2 3 4 5 6