Questions tagged [remote-server]
The remote-server tag has no summary.
80 questions
1 vote
2 answers
364 views
Ports open on jump server in CDE
We placed a jump server in CDE to restrict the direct access to PCI in-scope devices (although I believe it should be outside CDE, please confirm) Now, we have opened SQL ports 1433 and application ...
1 vote
2 answers
4k views
ssh authentication: is it possible to have password OR keys?
I'm wanting to use hashbackup to backup one server (A) to another server (B). Hashbackup can send the backup to server B, if server A has server B's key (public?) for passwordless ssh. I haven't used ...
0 votes
2 answers
774 views
Secure way to set up GitHub repository in shared remote machine
I have access to a shared remote machine to execute code and store data, accessible through SSH from my local machine, but I do not have root privileges there. The remote is shared among many users. I ...
1 vote
2 answers
590 views
Can a system be remotely controlled in GUI without you seeing it?
For instance: opening your web browser, opening your already logged in google account and checking your location history. If someone were doing this over RDP you'd be able to see it happening but is ...
0 votes
0 answers
165 views
What are my vulnerabilities with this multi-user ACL database approach?
I would like some expert insight. I want to know what my vulnerabilities for this model are. This is a demo project that I will be following in my production app if all works out securely. My ...
3 votes
1 answer
8k views
Logging into remote server via SSH using VPN (Wireguard). Is it foolproof?
I have a remote server into which I login via ssh. On this server I have setup a Wireguard VPN to which my host connects. The ssh server (ssh daemon) listens on a private IP interface (the server's ...
6 votes
5 answers
6k views
Why doesn't a simple HTTP request to display a remote web page violate the same-origin policy?
On a W3Schools page, I found that HTTP requests work like this: A client (a browser) sends an HTTP request to the web A web server receives the request, and runs an application to process it The ...
0 votes
2 answers
295 views
Store cookies for multiple sites on remote server and connect from multiple clients
Would it be secure to: Store all my website cookies (stack sites, webhost, github, web-based email, etc) on a remote server (using an customized open-source VPN or something) Login to the server with ...
0 votes
1 answer
1k views
Direct access to clients behind NAT [closed]
We have a client/server application which we set a port for both server and client to listen to and then enter a list of clients as IP (Host)/Port pair in the server's admin panel for monitoring ...
-1 votes
1 answer
2k views
Why is Google Remote Desktop not detected by company?
My company has been applying really strict information security policies with firewalls and good quality network equipment this is to prevent from someone to connect to the company network. Many of ...
2 votes
1 answer
4k views
What's the safest way to make home server available from outside the network?
I have an old laptop that I decided to use as a server, with some samba shares and whatnot (making available some dvd rips and the like), and I'd like to be able to access the files in it from not ...
1 vote
1 answer
499 views
Virtualized or Container (Remote) Based Browser Isolation is more secure?
There obvious costs differences between them but I am not sure from a security perspective which of them considered to be more secure.
0 votes
1 answer
655 views
How can Remote Code Execution in Unity infect me?
There is a Remote Code Execution Vulnerability in Unity, it sounds like a vulnerability that someone can infect you after they trick you click something, I guess. So assume I hadn't installed the ...
-1 votes
1 answer
369 views
Windows Remote Desktop access modes and security/functionality? [closed]
What are the security implications of running a Windows RDS farm vs. just using RDP for remote administration?
0 votes
1 answer
119 views
What are design and security considerations for a site that connects to its users' own dbs?
I'm envisaging a website where a user signs up, has their own database running somewhere, then provides credentials to the website so that website can access that database. For example, if I was the ...