Monthly Shaarli
July, 2017
I-Blocklist is a service dedicated to the distribution of Internet Protocol address lists.
How does it work?
I-Blocklist distributes lists in standard formats including P2P, DAT, and CIDR.
Our lists can be used with software such as PeerBlock, PeerGuardian, iplist, Vuze, Transmission, uTorrent and, pfBlocker.
Remove a Google malware warning? This site provides website owners with information and tools to assist them in finding and removing hacks - malware, malicious redirects, phishing, spam from their sites.
I work for OETIKER+PARTNER AG a consultancy company based in Olten, Switzerland. We use OpenSource Software extensively in all our projects. So I made it a habit to open source code we write whenever possible. Below is a list of notable projects I have created or been involved with over the years.
Guides & How-To
[May 29, 2007] - A complete Guide to Ris & Linux - Still a work in progress but almost complete
Clear your cache before downloading the guide, look the date as reference
Ris for Linux Tools: ris-linux-0.4.tar.gz
A working tftpd/samba session log, check it against your own log if you get problems
WINPE RIS from Linux - How to setup a ris server to boot winpe from network
RIS for Linux - Install windows using ris, without having a window server (multiplatform)
BINL protocol explained - Work in progress, Binl protocol analysis
Sources hosted on:
This page contains citations and references to information about Kerberos and related systems.
Papers and Documentation Describing Kerberos V5
Tutorials
Papers
Protocol Specifications
Proposed Protocol Extensions
Application Programming Interface
Using Kerberos for Authorization
Papers and Documentation Describing Kerberos V4
Tutorials
Papers
Protocol Specifications
Discussion and Critiques of Kerberos
Variants and Derivatives of KerberosREADME
Welcome to lagout.org !
If you want to make a copy of this website, go ahead, the server can handle the load !
If you think that the library should have new documents, tell us !
The Open Book Project is aimed at the educational community and seeks to encourage and coordinate collaboration among students and teachers for the development of high quality, freely distributable textbooks and educational materials on a wide range of topics. The advent of the Internet and the World Wide Web are making collaboration among educators on a global scale possible for the first time. We want to harness this exciting technology to promote learning and sharing.
Rosetta Code is a programming chrestomathy site. The idea is to present solutions to the same task in as many different languages as possible, to demonstrate how languages are similar and different, and to aid a person with a grounding in one approach to a problem in learning another. Rosetta Code currently has 851 tasks, 203 draft tasks, and is aware of 658 languages, though we do not (and cannot) have solutions to every task in every language.
VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of live malicious code.
VirusTotal Intelligence allows you to search through our dataset in order to identify files that match certain criteria (antivirus detections, binary content, metadata, submission file names, file format structural properties, file size, etc.). We could say that it is pretty much like the "Google" of malware.
In order to ease the use of the application we have classified the search queries and modifiers into the following categories, you can combine any number of them in the same query, moreover, you can use AND, OR and NOT operators to tweak your searches.
HackerOne Bounty is a continuous security program in which trusted hackers are incentivized to find critical vulnerabilities before they fall into the wrong hands. A Bounty program can be run privately (invite-only) or publicly (open for all) and is perfect for organizations looking for a security solution that keeps pace with an agile software development lifecycle.
“Pour des raisons de sécurité, je ne mets plus les patchs de sécurité, cela fait planter les serveurs.”
Greetings,
My name is Daniel, and I’m an information security practitioner and writer living in San Francisco, California. Most people come for my tutorials, my essays, or the podcast, but you can find some of my most popular content below.
SANS Dashboard:
Network Activity; Offensive IPs; Ports by Unique Sources; Ports by Unique Targets; Ports by Total Activity; StormCast; Diaries; Lastest Vulnerabilities
This dialogue provides a fictitious account of the design of an open-network authentication system called "Charon." As the dialogue progresses, the characters Athena and Euripides discover the problems of security inherent in an open network environment. Each problem must be addressed in the design of Charon, and the design evolves accordingly. Athena and Euripides don't complete their work until the dialogue's close.
When they finish designing the system, Athena changes the system's name to "Kerberos," the name, coincidentally enough, of the authentication system that was designed and implemented at MIT's Project Athena. The dialogue's "Kerberos" system bears a striking resemblence to the system described in Kerberos: An Authentication Service for Open Network Systems presented at the Winter USENIX 1988, at Dallas, Texas.
This collection is a presentation of fairly small Python programs. They are aimed at intermediate programmers; people who have studied Python and are fairly comfortable with basic recursion and object oriented techniques. Most programs are very short, not more than a couple of pages and all projects are accompanied with a write-up.
SuperTuxKart is a 3D open-source arcade racer with a variety characters, tracks, and modes to play. Discover more...
This is software for producing a 2D animation.
It is based on the software "Toonz", which was developed by Digital Video S.p.A. in Italy, customized by Studio Ghibli, and has been used for creating its works for many years. Dwango launches this OpenToonz project, in cooperation with Digital Video and Studio Ghibli.
This software can be used by anyone free of charge, no matter whether the purpose of use is commercial or not.
This is available as an open source, so that users can modify its source code freely.
We aim to develop a new platform for connecting the academic research into frontline animation production."Software that Works for Locksmiths"
Great Scott Gadgets makes open source hardware for innovative people.
Everything we produce at Great Scott Gadgets is open source, including all our hardware designs, software, and educational content. Our goal is to enable you to do things nobody has done before. We do that by building innovative hardware and software tools and by educating the community both online and through industry events. Most importantly, we support the community by releasing all of our work under open source licenses.
This Knowledge Base was put together and is maintained by Roberto Salgado, Co-Founder of Websec. It is a compilation of books, papers, cheatsheets and testing done by Roberto over the years.
Operational and technical headquarters was set up to locate large-scale cyber threats by the National Police of Ukraine and the Security Service of Ukraine. It includes representatives of the most famous Ukrainian and foreign cyber security companies. According to these facts, the pre-trial investigation was initiated by the National Police of Ukraine.
Comment: Yaroslav Trakalo, spokesman for the National Police of Ukraine
Коментар: Ярослав Тракало, речник Національної поліції України
Online resources
This website contains a collection of my opinions, photos and, more usefully, a bunch of open source software. Mostly I write about software and my experience creating and distributing it.
Here are my most recently updated / published work:
Server side spam filtering An updated guide to getting seamless server side spam filtering using bogofilter
Web Journal My weblog/online journal
Go Techniques Some techniques I've learned for writing in Golang
Forest Bus A distributed message bus / commit log for Go, Java and Python
SimpleTAL A standalone Python HTML & XML template library
PubTal The software used to maintain OwlFish.com - builds HTML pages from text files
Additionally I've also published ExpenseClam, an Expense tracking application for Android, on Google Play.
Pure-PHP implementations of:
BigIntegers
RSA
SSH2
SFTP
X.509
Symmetric key encryption
AES
Rijndael
Twofish
Blowfish
DES
3DES
RC4
RC2
phpseclib is designed to be ultra-compatible. It works on PHP4+ (PHP4, assuming the use of PHP_Compat) and doesn't require any extensions. For purposes of speed, mcrypt is used if it's available as is gmp or bcmath (in that order), but they are not required.
Like telephone numbers there are directories that relate the IP addresses to names such as "cnn.com". These names are called domain names and the directories are run on servers called Domain Name Servers or DNS. A Reverse DNS Lookup queries these servers in an attempt to find a match.