Weekly Shaarli

All links of one week in a single page.

Week 15 (April 10, 2017)

Andrew Dolgov / tt-rss | GitLab

Web-based news feed aggregator, designed to allow you to read news from any location, while feeling as close to a real desktop application as possible.

http://tt-rss.org

IBM X-Force Exchange
thumbnail

IBM X-Force Exchange Threat Feed Manager

Introducing threat feed manager: you can now view external sources of threat intelligence within XFE.

IBM Knowledge Center - Ariel Query Language

The Ariel Query Language (AQL) is a structured query language that you use to communicate with the Ariel databases. Use AQL to query and manipulate event and flow data from the Ariel database.

IBM developerWorks : Develop
thumbnail

Start developing with product trials, free downloads, and IBM Bluemix services. Sort by topic or product name and find everything we have to offer.

Computer Security Resource Center :: National Vulnerability Database - CWE Over Time

The two visualizations on this page are simple graphs which provide different views of how the assignment of vulnerability types has changed over time.

Directory listing - IBM FTP

Directory with qRadar documentation.

IBM Knowledge Center

Welcome to the IBM® Security QRadar® product documentation, where you can find information about how to install, maintain, and use these products.

Online Resources & Guides - How Can We Help?

Browse through our Knowledge Base

BroadAnalysis – Threat Intelligence and Malware Research

I am an independent security analyst providing cyber threat intelligence and network traffic associated with malware infections. I am located in the Albany, New York area.
All domains and URLs listed on this website should be considered as dangerous and could cause damage to your computer. We do not provide clickable active hyperlinks to these sites.

Use this website at your own risk!

The open archive HAL

HAL is an open archive where authors can deposit scholarly documents from all academic fields.

For the attention of the authors

The deposit must be made in agreement with the co-authors and in the respect for the policy of the publishers.
The deposit is subject of a control, HAL reserves the right to refuse items that do not meet the criteria of the archive.
Any deposit is definitive, no withdrawals will be made after the on-line posting of the publication.
Text files in pdf format or image files are sent to CINES for long-term archiving.

For the attention of the readers

In a context of electronic distribution, every author keep all its intellectual property rights.
Demande de révision de site Webpulse | Bluecoat

WebPulse contains a database of over 15 million entries and is growing every day. It provides URL identification to the PacketShaper via requests to WebPulse service points located across the globe. Each service point is periodically pinged in order to ensure that category, application, and operation IDs are provided from the fastest service point.

NVD - NVD Dashboard

NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.

NVD is a product of the NIST Computer Security Division, Information Technology Laboratory and is sponsored by the Department of Homeland Security’s National Cyber Security Division.

Softpanorama Switchboard

The main purpose of the site is to promote "slightly skeptical" approach to IT, to stimulate critical thinking about system administration and software development as professions. To increase resistance to media brainwashing. Skepticism is generally any questioning attitude towards knowledge, facts, or opinions/beliefs stated as facts, or doubt regarding claims that are taken for granted elsewhere.

Stucco-Data

This is a list of data sources that may be useful to cyber security. We are documenting these sources as part of an ongoing project, Stucco.

Détails All - K-net entier

Ce site et ses graphiques sont réalisés à partir de données issues de As24904 du Fournisseur d'accès internet K-Net.

Mes remerciements à Vivien & Lafibre.info, Jack pour leur collaboration.
Ce site utilise ChartJs pour générer les graphiques.

Contact, remarques, signalements de bugs: TiTiDu01, ou sur lafibre.info.

IBM Security App Exchange
thumbnail

IBM X-Force Exchange is a threat intelligence sharing platform enabling research on security threats, aggregation of intelligence, and collaboration with peers.

Browse, Download, Use. qRadar extensions verified for a better security.

Main :: SixXS - IPv6 Deployment & Tunnel Broker

SixXS (Six Access) is a free, non-profit, non-cost service for Local Internet Registries (LIR's) and endusers. The main target is to create a common portal to help company engineers find their way with IPv6 networks deploying IPv6 to their customers in a rapid and controllable fashion. To reach these targets we are providing a whitelabel IPv6 Tunnel Broker and Ghost Route Hunter, an IPv6 route monitoring tool and various other services to help out where needed.

A Community-Developed List of Software Weakness Types - CWE List Version 2.10

At its core, the Common Weakness Enumeration (CWE™) is a list of software weaknesses types. Creating the list is a community initiative aimed at creating specific and succinct definitions for each common weakness type. By leveraging the widest possible group of interests and talents, the hope is to ensure that item in the list is adequately described and differentiated.he community using this information.

BGP Looking Glass Database

Welcome to the biggest and most updated BGP Looking Glass and Traceroute list in internet You´ll find out 1073 Looking Glass Servers updated at 02/14/2017. If you find a broken link, or you want to announce a new looking glass site, please feel free to send us an email to info@bgplookingglass.com.