Monthly Shaarli

All links of one month in a single page.

February, 2017

Windows Security Log Encyclopedia

Web property of Monterey Technology Group, Inc. devoted to spreading knowledge and understanding of Windows Security, IT Audit and Compliance with exclusive content from Randy Franklin Smith.

Freedom of Information Act Electronic Reading Room | CIA FOIA (foia.cia.gov)

Welcome to the Central Intelligence Agency's Freedom of Information Act Electronic Reading Room.

Do UFOs fascinate you? Are you a history buff who wants to learn more about the Bay of Pigs, Vietnam or the A-12 Oxcart? Have stories about spies always fascinated you? You can find information about all of these topics and more in the Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Electronic Reading Room.

RSA Content - RSA Security Analytics Documentation

This space contains information about the RSA Content program for the RSA NetWitness Suite. It contains information on Rules, Reports, procedures, and meta related to content that is available on Live. The information in this space applies to all versions of Security Analytics (unless noted otherwise).

RSA NetWitness Suite - Table of Contents | RSA Link

RSA Content for the RSA NetWitness Suite: Documents; Procedures; Guides

CODER CORNER

Ok, let’s face it : I am a real, true, pure coder.

Guide de démarrage rapide WeeChat

Vous pouvez maintenant utiliser WeeChat et lire la FAQ/documentation pour toute autre question : https://weechat.org/doc

RSA NetWitness Logs Packets: Knowledge Base | RSA Link

Our mission is to be the place to go for collaboration and best practices among customers, partners, and industry experts. We built this resource with your needs in mind, and we hope you return often, contribute, provide feedback, and share your thoughts with us. We are listening.

bostonlink/nwmaltego: Netwitness Maltego integration Project
thumbnail

NWmodule.py

nwmodule.py is a python module I wrote that interfaces with the Netwitness REST API. All Maltego transforms are dependent on this module and functions within it. It must ne within the directory that contains the Maltego transforms.

Portail:Sécurité informatique — Wikipédia

La sécurité informatique est l'ensemble des moyens techniques, organisationnels, juridiques et humains nécessaires et mis en place pour conserver, rétablir, et garantir la sécurité des systèmes informatiques. Elle est intrinsèquement liée à la sécurité de l'information et des systèmes d'information.

Puppet: Reference Manual — Documentation — Puppet

Puppet 4.9 consists of:

A puppet-agent “All-in-One” package that installs Puppet, Ruby, Facter, Hiera, and supporting code.
A puppetserver package that installs Puppet Server.
A puppetdb package that installs PuppetDB.
Ransomware Tracker

Ransomware Tracker tracks and monitors the status of domain names, IP addresses and URLs that are associated with Ransomware, such as Botnet C&C servers, distribution sites and payment sites.
Ransomware Tracker provides a short guideline for both home users and enterprises on how to avoid becoming a victim of Ransomware.
Ransomware Tracker offers various blocklists. These blocklists allows enterprises to block malicious traffic towards known Ransomware infrastructure at the network edge, e.g. by blocking them on the corporate firewall, web proxy or in the local DNS server.

RSA NetWitness Suite | RSA Link

Our mission is to be the place to go for collaboration and best practices among customers, partners, and industry experts. We built this resource with your needs in mind, and we hope you return often, contribute, provide feedback, and share your thoughts with us. We are listening.

Certified Network Defender (CND) - EC-Council
thumbnail

Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.

RSA ESA Rules or Alerts | RSA Link

RSA NetWitness ESA Correlation Rules / Alerts available by default on the plateform

RSA Security Analytics 10.6.2 - Table of Contents | RSA Link

RSA Content for the RSA NetWitness Suite: Documents; Procedures; Guides.
For RSA Security Analytics 10.6.2

Essence by essence

A simple PHP library to extract information about web pages, like youtube videos, twitter statuses or blog articles.

RSA Netwitness - Use Cases | RSA Link

Scénarios et règles de détection disponibles de base sur RSA Netwitness.

Anti-Spam - Filtrage Statistique

Utilise la technique dite: "des réseaux bayesiens", décrit dans un article de Paul Graham.

Le filtre calcule des probabilités conditionnelles en fonction des informations observées (situées dans une base de données); chaque mot d'un message est évalué suivant les probabilités qu'il se trouve dans un message défini comme indésirable ou non.

Trustworthy Internet Movement

Together, we resolve major lingering security issues on the Internet, such as SSL governance and the spread of botnets and malware, by ensuring security is built into the very fabric of private and public clouds.
TIM, the Trustworthy Internet Movement is a non-profit, vendor-neutral organization leveraging the power of the global security community to advance industry-wide technology innovations and initiatives for actionable change.