Errors, bugs, questions - page 1515

You are missing trading opportunities:
- Free trading apps
- Over 8,000 signals for copying
- Economic news for exploring financial markets
Registration
Log in
You agree to website policy and terms of use
If you do not have an account, please register
The policy has not been changed.
Passwords are encrypted hardwired and the password files can be moved around within the computer. They are not decrypted when transferred to another computer/hardware.
Above I gave an example when the owner of someone else's computer gets access to the trading account:
If I insert a flash drive with my terminal into someone else's computer, and after logging in a bad person steals some files from the folder. He will have access to the trading account.
It is interesting that if you use someone else's computer at all, as iron - to download and OS from his flash drive. The owner of the computer will still have access to the trading account, if he can get to the files of the terminal.
Above is an example of the owner of someone else's computer gaining access to a trading account:
Interestingly, if you use someone else's computer at all, as an iron - to boot and OS from your flash drive. The owner of the computer will still have access to the trading account if he gets to the terminal files.
Let's take it one step at a time.
1. You insert a flash drive into someone else's computer. Run the terminal with the /portable flag.
2. You have finished working with the terminal, take the flash drive out of someone else's computer and put it in your pocket.
3. How can someone steal your password?
Let's take it in order.
1. You insert the USB stick into someone else's computer. You start the terminal with the /portable flag
2. You finish working with the terminal, take the flash drive out of someone else's computer and put it in your pocket.
3. How could someone steal your password?
There are several options:
There are several options:
Give proof of your assertion.
I, in turn, can offer you a full-scale experiment.
1. Form a flash drive, run the client terminal from it, make sure everything works.
2. Plug that flash drive into another computer, run the client terminal and make sure everything works.
3. Copy all the data from this flash drive to another flash drive.
4. Run the terminal from the new flash drive and make sure the password (which the intruder doesn't know) is asked for.
5. And don't get fancy
Give proof of your assertions.
I, for my part, can offer you a field experiment.
1. Generate a flash drive, run the client terminal from it, make sure everything works.
2. Plug that flash drive into another computer, run the client terminal and make sure everything works.
3. Copy all data from this flash drive to another flash drive.
4. Run terminal from new flash drive and make sure the password will be asked for (which intruder doesn't know).
No password requested, full connection to trading account! Step by step:
Original (not virtual) machine is Windows7 SP1 x64. Alien (not virtual) machine - Windows XP SP3 x32.
5. And don't get fancy.
Unfortunately, none of the developers saw the security hole even when the full method was described. Reproduced - for some reason not lazy. You have a HOLE!
SPY
Above gave an example where the owner of someone else's computer gets access to a trading account:
The interesting thing is that if you use the other person's computer altogether, as an iron - boot the OS from your flash drive as well. Then the owner of the computer will still have access to the trading account if he gets to the terminal files.
Above was an example where the owner of someone else's computer gains access to the trading account:
It's interesting that if I use another computer as a hardware - to boot and OS from my flash drive. The owner of the computer will still have access to the trading account if he gets to the terminal files.
It is not the host who gets it, but you yourself who gives him all your hardware.
When transferring with a flash drive to another computer, you will definitely be asked for passwords again and you may not check the "save passwords linked to the current computer" box. As a result, no passwords will be saved and no one will steal them.
And don't pretend that the item "yes, I saved the password myself by selecting the save checkbox" is not there:
On another computer, terminal.exe /portable is launched. It asks for a password - I enter it and connect.
It is not the host who gets it, but you yourself who transfers all your hardware to it.
Stop pretending that you don't understand anything: Background can be dragged off a flash drive. There are plenty of other ways. The main thing is to drag it out. You don't even have to do it on someone else's computer itself.
When you transfer with a flash drive to another computer, you will definitely be asked for your passwords again and you may not check the "keep passwords linked to the current computer" box. As a result, no passwords will be saved and no one will steal them.
And don't pretend that the "yes, I saved the password myself by selecting the save checkbox" is not there:
That checkbox is by default...
I had no doubt that you especially would not publicly admit to having a hole. Just as there is no doubt that you will work to fix it...
It remains for me to ask the community what they think about it. But since no one will speak out anyway, we can close the thread.
Familiar guys warned just in case, that with their mobile terminals (flash drive) were poakkuratelno. I warned the guys I knew before that transferring the folder would reset the login data to zero.
The policy has not changed.