Communities

Writing
Writing
Codidact Meta
Codidact Meta
The Great Outdoors
The Great Outdoors
Photography & Video
Photography & Video
Scientific Speculation
Scientific Speculation
Cooking
Cooking
Electrical Engineering
Electrical Engineering
Judaism
Judaism
Languages & Linguistics
Languages & Linguistics
Software Development
Software Development
Mathematics
Mathematics
Christianity
Christianity
Code Golf
Code Golf
Music
Music
Physics
Physics
Linux Systems
Linux Systems
Power Users
Power Users
Tabletop RPGs
Tabletop RPGs
Community Proposals
Community Proposals
tag:snake search within a tag
answers:0 unanswered questions
user:xxxx search by author id
score:0.5 posts with 0.5+ score
"snake oil" exact phrase
votes:4 posts with 4+ votes
created:<1w created < 1 week ago
post_type:xxxx type of post
Search help
Notifications
Mark all as read See all your notifications »
Q&A

Welcome to the Power Users community on Codidact!

Power Users is a Q&A site for questions about the usage of computer software and hardware. We are still a small site and would like to grow, so please consider joining our community. We are looking forward to your questions and answers; they are the building blocks of a repository of knowledge we are building together.

Posts tagged information-security

This tag doesn't have any usage information yet.

This tag doesn't have a detailed wiki yet.

66%
+2 −0
Q&A Understanding OAuth(2) security: what's a realistic threat model?

Suppose I want to use some functionality on foo.com which requires associating my activity with me specifically - for example, posting on a forum, or playing some games and having the site keep tra...

1 answer  ·  posted 6d ago by Karl Knechtel‭  ·  last activity 3d ago by Michael‭

71%
+3 −0
Q&A What are the security or privacy implications of browser clipboard events?

For context, I use Firefox to browse the Web. Some time ago, I followed some security- and privacy-oriented advice for configuring Firefox, which recommended (among many other things) disabling the...

1 answer  ·  posted 2mo ago by Karl Knechtel‭  ·  last activity 2mo ago by matthewsnyder‭

55%
+3 −2
Q&A What actions should be performed to restore a website after a DDoS attack?

My shared hosting provider suffices (at least on contract) daily, weekly, and monthly automatic backups; besides that, I also routinely backup my website's filetree and database not automatically i...

1 answer  ·  posted 3y ago by deleted user  ·  edited 6mo ago by Michael‭

20%
+0 −6
Q&A How effortlessly can universities check where you logged in? What other IT details can they determine?

Assume you're accessing your university Canvas LMS and Intranet (is this the correct term?) — e.g. your university email, library website, etc... — normally, without VPN or proxy. Assume you have...

1 answer  ·  posted 2y ago by TextKit‭  ·  last activity 2y ago by dsr‭