What does it take to “identify software”? How can we tell what software is running on a machine to determine, for example, what security vulnerabilities might affect it?
What does it take to “identify software”? How can we tell what software is running on a machine to determine, for example, what security vulnerabilities might affect it?
Topic | Replies | Views | Activity | |
---|---|---|---|---|
Add Guix to recommended immutable desktop OS | 7 | 1699 | October 19, 2024 | |
Privacy-focused crypto asset management & tax software | 1 | 280 | January 15, 2024 | |
OpSec Question: Which operating system is better? Tails? Whonix? Qubes? Kicksecure? Which one is better? (Read before asking) | 34 | 4086 | August 9, 2024 | |
How to audit proprietary software | 4 | 483 | November 30, 2022 | |
Thoughts on Lynis | 1 | 303 | January 31, 2024 |
Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.
Privacy Guides is a non-profit, socially motivated website that provides information for protecting your data security and privacy.
We do not make money from recommending certain products, and we do not use affiliate links.