Monthly Shaarli

All links of one month in a single page.

July, 2017

I-BlockList | Lists

I-Blocklist is a service dedicated to the distribution of Internet Protocol address lists.

How does it work?
I-Blocklist distributes lists in standard formats including P2P, DAT, and CIDR.
Our lists can be used with software such as PeerBlock, PeerGuardian, iplist, Vuze, Transmission, uTorrent and, pfBlocker.

Aw Snap

Remove a Google malware warning? This site provides website owners with information and tools to assist them in finding and removing hacks - malware, malicious redirects, phishing, spam from their sites.

Tobi Oetiker - Tobi Oetiker's Toolbox

I work for OETIKER+PARTNER AG a consultancy company based in Olten, Switzerland. We use OpenSource Software extensively in all our projects. So I made it a habit to open source code we write whenever possible. Below is a list of notable projects I have created or been involved with over the years.

Guides & How-To

Guides & How-To

[May 29, 2007] - A complete Guide to Ris & Linux - Still a work in progress but almost complete

Clear your cache before downloading the guide, look the date as reference

Ris for Linux Tools: ris-linux-0.4.tar.gz

A working tftpd/samba session log, check it against your own log if you get problems

WINPE RIS from Linux - How to setup a ris server to boot winpe from network

RIS for Linux - Install windows using ris, without having a window server (multiplatform)

BINL protocol explained - Work in progress, Binl protocol analysis

Sources hosted on:

https://github.com/sherpya/ris-linux/

Kerberos Papers and Documentation

This page contains citations and references to information about Kerberos and related systems.

Papers and Documentation Describing Kerberos V5
    Tutorials
    Papers
    Protocol Specifications
    Proposed Protocol Extensions
    Application Programming Interface
    Using Kerberos for Authorization 
Papers and Documentation Describing Kerberos V4
    Tutorials
    Papers
    Protocol Specifications
    Discussion and Critiques of Kerberos 
Variants and Derivatives of Kerberos
Lagout

README

Welcome to lagout.org !
If you want to make a copy of this website, go ahead, the server can handle the load !
If you think that the library should have new documents, tell us !

Open Book Project

The Open Book Project is aimed at the educational community and seeks to encourage and coordinate collaboration among students and teachers for the development of high quality, freely distributable textbooks and educational materials on a wide range of topics. The advent of the Internet and the World Wide Web are making collaboration among educators on a global scale possible for the first time. We want to harness this exciting technology to promote learning and sharing.

Rosetta Code

Rosetta Code is a programming chrestomathy site. The idea is to present solutions to the same task in as many different languages as possible, to demonstrate how languages are similar and different, and to aid a person with a grounding in one approach to a problem in learning another. Rosetta Code currently has 851 tasks, 203 draft tasks, and is aware of 658 languages, though we do not (and cannot) have solutions to every task in every language.

VirusShare.com

VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of live malicious code.

VirusTotal Intelligence - Your malware research telescope (login required)

VirusTotal Intelligence allows you to search through our dataset in order to identify files that match certain criteria (antivirus detections, binary content, metadata, submission file names, file format structural properties, file size, etc.). We could say that it is pretty much like the "Google" of malware.
In order to ease the use of the application we have classified the search queries and modifiers into the following categories, you can combine any number of them in the same query, moreover, you can use AND, OR and NOT operators to tweak your searches.

Bug Bounty, Vulnerability Coordination - HackerOne

HackerOne Bounty is a continuous security program in which trusted hackers are incentivized to find critical vulnerabilities before they fall into the wrong hands. A Bounty program can be run privately (invite-only) or publicly (open for all) and is perfect for organizations looking for a security solution that keeps pace with an agile software development lifecycle.

Excuses cyber ^ sécurité

“Pour des raisons de sécurité, je ne mets plus les patchs de sécurité, cela fait planter les serveurs.”

Daniel Miessler :: information security, technology, and humans
thumbnail

Greetings,

My name is Daniel, and I’m an information security practitioner and writer living in San Francisco, California. Most people come for my tutorials, my essays, or the podcast, but you can find some of my most popular content below.

Dashboard - SANS Internet Storm Center
thumbnail

SANS Dashboard:
Network Activity; Offensive IPs; Ports by Unique Sources; Ports by Unique Targets; Ports by Total Activity; StormCast; Diaries; Lastest Vulnerabilities

Designing an Authentication System: a Dialogue in Four Scenes

This dialogue provides a fictitious account of the design of an open-network authentication system called "Charon." As the dialogue progresses, the characters Athena and Euripides discover the problems of security inherent in an open network environment. Each problem must be addressed in the design of Charon, and the design evolves accordingly. Athena and Euripides don't complete their work until the dialogue's close.
When they finish designing the system, Athena changes the system's name to "Kerberos," the name, coincidentally enough, of the authentication system that was designed and implemented at MIT's Project Athena. The dialogue's "Kerberos" system bears a striking resemblence to the system described in Kerberos: An Authentication Service for Open Network Systems presented at the Winter USENIX 1988, at Dallas, Texas.

Python for Fun

This collection is a presentation of fairly small Python programs. They are aimed at intermediate programmers; people who have studied Python and are fairly comfortable with basic recursion and object oriented techniques. Most programs are very short, not more than a couple of pages and all projects are accompanied with a write-up.

SuperTuxKart

SuperTuxKart is a 3D open-source arcade racer with a variety characters, tracks, and modes to play. Discover more...

OpenToonz
thumbnail
This is software for producing a 2D animation.

It is based on the software "Toonz", which was developed by Digital Video S.p.A. in Italy, customized by Studio Ghibli, and has been used for creating its works for many years. Dwango launches this OpenToonz project, in cooperation with Digital Video and Studio Ghibli.
This software can be used by anyone free of charge, no matter whether the purpose of use is commercial or not.
This is available as an open source, so that users can modify its source code freely.
We aim to develop a new platform for connecting the academic research into frontline animation production.
Blackhawk Products: Locksmith Software, Key Codes, Lock Codes

"Software that Works for Locksmiths"

Great Scott Gadgets

Great Scott Gadgets makes open source hardware for innovative people.

Everything we produce at Great Scott Gadgets is open source, including all our hardware designs, software, and educational content. Our goal is to enable you to do things nobody has done before. We do that by building innovative hardware and software tools and by educating the community both online and through industry events. Most importantly, we support the community by releasing all of our work under open source licenses.

The SQL Injection Knowledge Base

This Knowledge Base was put together and is maintained by Roberto Salgado, Co-Founder of Websec. It is a compilation of books, papers, cheatsheets and testing done by Roberto over the years.

(78) Прикриттям наймасштабнішої кібератаки в історії України став вірус Diskcoder.C - YouTube
thumbnail

Operational and technical headquarters was set up to locate large-scale cyber threats by the National Police of Ukraine and the Security Service of Ukraine. It includes representatives of the most famous Ukrainian and foreign cyber security companies. According to these facts, the pre-trial investigation was initiated by the National Police of Ukraine.

Comment: Yaroslav Trakalo, spokesman for the National Police of Ukraine

Коментар: Ярослав Тракало, речник Національної поліції України

www.baycollege.edu - /BayCollege/media/Academics/Areas of Study/

Online resources

owlfish.com

This website contains a collection of my opinions, photos and, more usefully, a bunch of open source software. Mostly I write about software and my experience creating and distributing it.

Here are my most recently updated / published work:
Server side spam filtering An updated guide to getting seamless server side spam filtering using bogofilter
Web Journal My weblog/online journal
Go Techniques Some techniques I've learned for writing in Golang
Forest Bus A distributed message bus / commit log for Go, Java and Python
SimpleTAL A standalone Python HTML & XML template library
PubTal The software used to maintain OwlFish.com - builds HTML pages from text files

Additionally I've also published ExpenseClam, an Expense tracking application for Android, on Google Play.

phpseclib: pure PHP implementations of SSH, SFTP, RSA and X.509

Pure-PHP implementations of:

BigIntegers
RSA
SSH2
SFTP
X.509
Symmetric key encryption
    AES
    Rijndael
    Twofish
    Blowfish
    DES
    3DES
    RC4
    RC2

phpseclib is designed to be ultra-compatible. It works on PHP4+ (PHP4, assuming the use of PHP_Compat) and doesn't require any extensions. For purposes of speed, mcrypt is used if it's available as is gmp or bcmath (in that order), but they are not required.

Reverse DNS Lookup

Like telephone numbers there are directories that relate the IP addresses to names such as "cnn.com". These names are called domain names and the directories are run on servers called Domain Name Servers or DNS. A Reverse DNS Lookup queries these servers in an attempt to find a match.