What’s being hidden from me?

Profile: Nomanonn
Tags:
Encryption
Hacking
privacy
Security
SQLite
I'm either crazy or I'm on to some sneaky stuff going on. My spouse pretends to not know what an IP address is but has SQL injector and ridiculous levels of encryption and cloud accounts and files I cant get into. There's more to it but idk how safe it is for me to say and I'm not trying to cause epic insanity I just want an idea of what's being hidden from me.

3 Replies to this discussion

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members reply.
  • ToddN2000
    How do you know there is SQL injector being used? That is a method for hacking sites. How do you know there is encryption? Are you trying to view encrypted files ? They may not be hiding anything from you. My wife has her own laptop and e-mails. Nothing there I probably could not figure out how to get into.  It's just here own personal stuff. She could be hiding something but has never given me a reason to doubt her even after 23 years together.  
    85,020 pointsBadges:
    report
  • Veretax
    Todd asks a good question, but just because your spouse is using encryption doesn't mean he's trying to hide something from you either.

    HTTPS technically encrypts things, and I also wonder what you mean when you say levels of encryption.
    8,665 pointsBadges:
    report
  • ToddN2000
    Gave this some more thought this morning. Maybe he has stuff encrypted to prevent a hacker from seeing what is on his system. With all the malware, spyware and viruses out there, he might just be very protective of his data.
    85,020 pointsBadges:
    report

3 Related Discussions

 

What's the best way to store files in a disk?

I have a project that I'm trying to figure out the best approach. I'm using .NET Application and I need to store 200,000 objects. 10 of the need to be stored per second from multiple threads. I'm using binaryserialization before storing them and I'll need to access them later by either an integer or unique ID. What's the best way to store these many files? Should I use a file system? ITKE Profile: ITKE

Help on database testing

I have IBEXPERT in my system and I want to connect to the database in IBEXPERT through selenium. I'm trying with interbase.interclient.Driver and also I have interclient.jar file in "path". While executing I got nullpointerexception. Can any one help me on:
  1. How to connect to the IBexpert?
  2. If it is through the interbase,what is driver name,and where to download the jar filr for driver?
Profile: vijethasrujana

Experiences with COBIT

I'm another student from UAT (University of Advancing Technology) seeking some opinions and experiences with COBIT (Control Objectives for Information and Related Technology). I've done some research and COBIT seems to be an encompassing framework designed to cover most areas of IT, but because of this it lacks granularity. I've heard it maps will to other frameworks, and noticed it mentioned along side them often. It seems like COBIT is an empowering tool, but consumes resources and time keeping it up to date. If anyone has experience with COBIT please let me know what you've found from working with it. I would also welcome the opinions of anyone who has done research on COBIT. Profile: chuck4it
  • Ben Rubenstein
    Hi Chuck,

    I haven't had any experience with COBIT, but thought I'd share some related content/research that may help you:



    11,255 pointsBadges:
    report
  • Kevin Beaver
    COBIT is a well-known framework for IT governance. As I mostly focus on performing technical security vulnerability assessments, I've never been involved with a project that involved COBIT but I have many colleagues that use it. From what I know, it's used mainly in larger organizations (several hundred to several thousand plus employees) but, interestingly, I've never seen it in action.

    Like you said, COBIT can be high-level but it's up to each enterprise to fine-tune and make it more granular based on their unique needs. And managing such a program can be resource intensive. It's not all that different from ISO 27001/27002 and many of the government compliance regulations in that regard.
    24,230 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: