172 private links
Vertical Video Syndrome
For many years, DomainTools has served the domain professional community with Whois and domain name research tools to drive your investments, research buyers, find new domains and manage existing portfolios.
Bien le bonsoir oiseaux de nuit ou de jour,
J’ai rassemblé des services pour le bonheur des personnes intéressées par l’informatique.
Voici les différents services proposés sur https://www.lagout.org , tous issus du libre :
Zerobin : Partagez vos textes ou codes de manière simple et sécurisée.
Documentation: Base de connaissances portant sur l'informatique
Lutim : Hébergeur d’images
Serveur IRC : Venez échanger sur nos différents salons
Jyrafeau : Hébergeur de fichiers temporaires
Si vous avez de la doc à partager, contactez moi, je me ferais un plaisir de l’ajouter !
https://www.lagout.org/contact.html
Et si vous voulez m'aider à maintenir ce site :
https://www.lagout.org/dons.html
Merci de votre visite !
HelpX is an online listing of host organic farms, non-organic farms, farmstays, homestays, ranches, lodges, B&Bs, backpackers hostels and even sailing boats who invite volunteer helpers to stay with them short-term in exchange for food and accommodation.
I-Blocklist is a service dedicated to the distribution of Internet Protocol address lists.
How does it work?
I-Blocklist distributes lists in standard formats including P2P, DAT, and CIDR.
Our lists can be used with software such as PeerBlock, PeerGuardian, iplist, Vuze, Transmission, uTorrent and, pfBlocker.
HackerOne Bounty is a continuous security program in which trusted hackers are incentivized to find critical vulnerabilities before they fall into the wrong hands. A Bounty program can be run privately (invite-only) or publicly (open for all) and is perfect for organizations looking for a security solution that keeps pace with an agile software development lifecycle.
"Software that Works for Locksmiths"
Great Scott Gadgets makes open source hardware for innovative people.
Everything we produce at Great Scott Gadgets is open source, including all our hardware designs, software, and educational content. Our goal is to enable you to do things nobody has done before. We do that by building innovative hardware and software tools and by educating the community both online and through industry events. Most importantly, we support the community by releasing all of our work under open source licenses.
Remove a Google malware warning? This site provides website owners with information and tools to assist them in finding and removing hacks - malware, malicious redirects, phishing, spam from their sites.
“Pour des raisons de sécurité, je ne mets plus les patchs de sécurité, cela fait planter les serveurs.”
I work for OETIKER+PARTNER AG a consultancy company based in Olten, Switzerland. We use OpenSource Software extensively in all our projects. So I made it a habit to open source code we write whenever possible. Below is a list of notable projects I have created or been involved with over the years.
Greetings,
My name is Daniel, and I’m an information security practitioner and writer living in San Francisco, California. Most people come for my tutorials, my essays, or the podcast, but you can find some of my most popular content below.
This Knowledge Base was put together and is maintained by Roberto Salgado, Co-Founder of Websec. It is a compilation of books, papers, cheatsheets and testing done by Roberto over the years.
Guides & How-To
[May 29, 2007] - A complete Guide to Ris & Linux - Still a work in progress but almost complete
Clear your cache before downloading the guide, look the date as reference
Ris for Linux Tools: ris-linux-0.4.tar.gz
A working tftpd/samba session log, check it against your own log if you get problems
WINPE RIS from Linux - How to setup a ris server to boot winpe from network
RIS for Linux - Install windows using ris, without having a window server (multiplatform)
BINL protocol explained - Work in progress, Binl protocol analysis
Sources hosted on:
Operational and technical headquarters was set up to locate large-scale cyber threats by the National Police of Ukraine and the Security Service of Ukraine. It includes representatives of the most famous Ukrainian and foreign cyber security companies. According to these facts, the pre-trial investigation was initiated by the National Police of Ukraine.
Comment: Yaroslav Trakalo, spokesman for the National Police of Ukraine
Коментар: Ярослав Тракало, речник Національної поліції України
SANS Dashboard:
Network Activity; Offensive IPs; Ports by Unique Sources; Ports by Unique Targets; Ports by Total Activity; StormCast; Diaries; Lastest Vulnerabilities
This page contains citations and references to information about Kerberos and related systems.
Papers and Documentation Describing Kerberos V5
Tutorials
Papers
Protocol Specifications
Proposed Protocol Extensions
Application Programming Interface
Using Kerberos for Authorization
Papers and Documentation Describing Kerberos V4
Tutorials
Papers
Protocol Specifications
Discussion and Critiques of Kerberos
Variants and Derivatives of Kerberos
This dialogue provides a fictitious account of the design of an open-network authentication system called "Charon." As the dialogue progresses, the characters Athena and Euripides discover the problems of security inherent in an open network environment. Each problem must be addressed in the design of Charon, and the design evolves accordingly. Athena and Euripides don't complete their work until the dialogue's close.
When they finish designing the system, Athena changes the system's name to "Kerberos," the name, coincidentally enough, of the authentication system that was designed and implemented at MIT's Project Athena. The dialogue's "Kerberos" system bears a striking resemblence to the system described in Kerberos: An Authentication Service for Open Network Systems presented at the Winter USENIX 1988, at Dallas, Texas.
Online resources
README
Welcome to lagout.org !
If you want to make a copy of this website, go ahead, the server can handle the load !
If you think that the library should have new documents, tell us !