-
Keep a hash of the last DNS settings written by the app. When we read a config file and there's no DNS settings present, check the hash, see if the old settings are still applied to the NIC's, and if…
-
This is not totally necessary, but it will prevent external users who can see the code from tampering with our Firebase instance.
-
A good testing regime could include the following:
* Perform an initial backup
* Verify volume
* Perform an incremental backup
* Verify volume
* Prune first backup
* Verify volume
* Diff volu…
-
Add support for signed updates to UpdateManager in order to prevent tampering as a result of a fortuitous event like issue #2469 ;-)
robbi updated
5 years ago
-
> The hash for the file is not present in the specified catalog file. The file is likely corrupt or the victum of tampering.
As for the bat,
> devcon failed
-
Humbug currently, as a first step towards building an XML configuration, strips all filter, listener and logging elements. Assess for potential problems. Do we really need to stripping out code covera…
-
Without tampering with the text file itself, keying in a book name with pipes in it (e.g. `new | book`) corrupts the text file and prevents the product from using the book names with pipes in them. Th…
-
# :bug: Bug report
## Description
If you change the language in juice-shop, even the product description for the OWASP SSL Advanced Forensic Tool (O-Saft) is changed to that language. That's aweso…
-
Not really an issue with the software, but any plans on getting a certificate for the site to prevent MITM tampering with the converted extensions?
-
To prevent any incorrect tampering by the user that might lead to the application crashing.
On that note, throwing exceptions when the file has bad data is important as well to stop crashes even if f…