ports – Is it a security risk to host the CS: GO server on my PC?

The biggest risk is probably 0 day or just a uncorrected vulnerability in the CS: GO server software.

Against a 0 day, you're pretty helpless. You can give the user running the CS: GO process with as few permissions as possible. If your server is compromised, the attacker can only act with the permission of that user, as long as he also does not exploit a local elevation of privilege. Being the victim of such a 0-day is not very likely, but it is always a residual risk when exposing a service to the Internet.

To avoid being compromised via an uncorrected vulnerability, well, patch your CS: GO server regularly. Find out where users are notified of new fixes and vulnerabilities and monitor these sources. If you can't fix it immediately, consider stopping the server until you can fix it.

In case you don't offer the server 24/7 and mainly play yourself, stop the server when it is not needed. Reducing the attack surface also means reducing the service uptime.

How to prevent the iPhone from being turned off? (security intent)

Is there any way to prevent the phone from turning off when it is locked? The idea is to prevent thieves from turning off the phone so that I can always track the location of the phone using the iCloud Find My Phone tool.

security – CSS has been ignored due to mime type incompatibility

I'm working on the client-side web part using JavaScript and CSS for customization.

I added custom CSS and JS in the page and I get the message on the browser console, that is to say

CSS was ignored due to mime type mismatch

I have checked the paths of the CSS files and all are correct. I have searched the internet for the same problem and applied the following paths, but none of them worked.

  • Installation of the Core update in SharePoint available here.

  • Installation of the language update pack available here

  • Checked that the static content function is installed on the machine

  • MIME type is available in IIS

  • Checked the registry for CSS and it has the appropriate file type mentioned, ie text / css.

The above solutions did not work.

The interesting part is: when I load the same css from SharePoint Hive (15), it loads correctly.

Can someone help me solve the problem.

Environment: SP2019 Windows Server 2019 Standard Evaluation


security – can i see my direct counterpart's address?

First of all, nodes do not necessarily have addresses, nor necessarily only one. Addresses are not identities and are not linked to nodes. A node operator can operate a node without a wallet, so that node does not have an address. A node operator could have a wallet on its node that has multiple addresses, that node would have multiple addresses. So this idea that each node has an address is itself incorrect.

For nodes that have portfolios, the wallet and the node operate essentially separately. The node part (manages P2P, tx and block validation, etc.) does not know the content of the portfolio. It does not know which addresses are in the wallet and which transactions actually belong to the wallet. So no, the node cannot directly reveal the addresses of its associated portfolios because it does not have access to this information.

The only way to learn the addresses that belong to a node is to observe the transactions it sends. But to know which transactions it really sends, you need to surround this node with nodes that you control so that you can control / observe everything that this node learns and sends. When it sends a transaction, it will be a transaction that has not been relayed to it by one of your nodes around it, so you know that the transaction originated from that node and you can then use d & # 39 other blockchain analysis techniques on this transaction to learn more. This type of attack is known as a sybil attack.

Another related attack is to connect to each unique node on the network and see which node first relays a transaction. However, this is fundamentally impossible to do. There are many nodes that are not listening, so you will not be able to connect to them. Additionally, due to latency and physics, this is not as reliable as your nodes could learn the transaction from a relay node instead of direct connection to the sender. if there is too much latency on this direct connection.

However, carrying out these attacks is not easy. Nodes have active countermeasures to make these attacks more expensive and increase their own confidentiality. These attacks can be quite costly and there is no real monetary gain from learning this information.

linux – Are security checks carried out by independent agencies on open source software like Ubuntu or Mozilla Firefox?

Any intentional malware injected into open source software by the same people who develop it may possibly be known because the source code is open to the public. However, if the code base is large, average people do not have the time and resources to browse it, and so it is possible that such malware will go undetected for a long time. It is therefore important to develop independent agencies to regularly review changes to the software. Do these agencies exist and are they reliable?

Potential security issue in the custom taxonomy search functionality

I want to add functionality to a WordPress client site that allows you to include taxonomy terms from custom post types in WordPress search, and find the following answer:

Include a custom taxonomy term in the search

This solution works, but in the comments, one user mentioned that "it is probably not a good idea to inject the publicly available raw search string directly into an SQL query". and added a link for further reading. I don't see anything in this link that relates to the specifics of the answer.

For a quick reference, the code for the answer is below, would this code be a security risk? And if so, what would be the solution so that you can still have the option of including taxonomy terms in WP search without security risk?

thank you so much

// search all taxonomies, based on: http://projects.jesseheap.com/all-projects/wordpress-plugin-tag-search-in-wordpress-23

function atom_search_where($where){
global $wpdb;
if (is_search())
    $where .= "OR (t.name LIKE '%".get_search_query()."%' AND {$wpdb->posts}.post_status = 'publish')";
return $where;

function atom_search_join($join){
global $wpdb;
if (is_search())
    $join .= "LEFT JOIN {$wpdb->term_relationships} tr ON {$wpdb->posts}.ID = tr.object_id INNER JOIN {$wpdb->term_taxonomy} tt ON tt.term_taxonomy_id=tr.term_taxonomy_id INNER JOIN {$wpdb->terms} t ON t.term_id = tt.term_id";
return $join;

function atom_search_groupby($groupby){
global $wpdb;

// we need to group on post ID
$groupby_id = "{$wpdb->posts}.ID";
if(!is_search() || strpos($groupby, $groupby_id) !== false) return $groupby;

// groupby was empty, use ours
if(!strlen(trim($groupby))) return $groupby_id;

// wasn't empty, append ours
return $groupby.", ".$groupby_id;

add_filter('posts_join', 'atom_search_join');
add_filter('posts_groupby', 'atom_search_groupby');

Bitlocker Powershell Module – Exchange of Information Security Stacks

I am more recent on the subject of Powershell modules in general, find them, download them (or find / install them from the Internet using find-module and install-module, etc.). But I specifically need information for the moment on the research / installation of the bitlocker module. I see many forum references to cmdlets in this module, but no one mentions the module itself. "Install-module bitlocker" errors appear with "No match found" for the name of this module. I am doing this from a Windows 2016 server.

security – Api authorization for proprietary and third-party applications

I have a few microservices that I would like to combine as an API. The main purpose of the API is to be used by our mobile application (part one). Note: we don't have a mobile app or web app at the moment and we want the backend to be completely decoupled from the frontend. But I can see that soon some third parties might also need to access the same API. I designed the API with the basic endpoint for all types of resources. My question is about the API and client authorization flow.

I'm leaning for using Oauth 2.0. Password flow for our own application (part 1) and authorization flow or authorization flow with PCKE depending on the type of third party client. Is this a safe way to solve it? How is it generally done?

So for a third-party developer, the flow would be something like this. They sign up using our mobile app, create an app (client ID and secret) and can then use it for authorization. This brings me to another question

1) Would it be safe to expose the registration and create an application endpoint to third parties? Or should only our app be able to create apps and register new users?

Does VPN offer 100% security?

If you connect to Amazon's website using a VPN, does this offer 100% security and does it mask the static IP address? OR is data leaking and appearing, which makes Amazon suspect?

Use of Google Forms and security settings

We are considering using Google Forms and we need to know if it can be used to collect and process personal information such as name, address, phone, etc. Could someone make a recommendation based on their industry experience with Google Forms and possibly Google Map?
Is there a way to run it safely?
thank you,