172 private links
Country Knowledgebase on SIGINT/COMINT Installations, and Vendors.
Signals intelligence (SIGINT) is intelligence-gathering by interception of signals, whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT). Signals intelligence is a subset of intelligence collection management.
TecAdmin.net is a blog was started on Feb 07, 2013 by Rahul Kumar. This was started with the goal of providing easy how to guides for Linux/Windows system administrators. We are always trying to provides high quality articles which would be easy to learn.
Things I've figured out how to do. This includes the Exim Cheatsheet, RPM Patching and Rebuilding Guide, Solaris DiskSuite Mirroring Guide, and numerous others.
The OAV.Net was a project I wanted to start after I saw The Animearchive. I wanted to make some big website in France (and maybe international one ?) about OAV, Mangas, and in general Japanese Animation and Comics.
Because I never had the time to make that, so this website is mostly my own website and portail for my own projects.
-> Some copy of good documentation about several subjects that are very interressing...
If you are looking for official 10.6 documentation published by the RSA NetWitness Information Design and Development team -- user guides, release notes, installation instructions -- you are in the right place.
List all 10.6 user documentation (HTML and PDF): open the RSA Security Analytics 10.6 Table of Contents
List all documents in PDF format: click the PDFs category
List all guides in HTML format: click the Table of Contents category
List release documents--release notes, installation guides, and update instructions: click the Installation & Upgrade category
View translated 10.6 guides in PDF format: click French, Spanish, Japanese, or German
The Linux-HA project maintains a set of building blocks for high availability cluster systems, including a cluster messaging layer, a huge number of resource agents for a variety of applications, and a plumbing library and error reporting toolkit.
The following guides are the complete library for Security Analytics host and service configuration. Included are end-to-end initial setup and configuration instructions for each Security Analytics host and service, reference materials, and a database tuning guide. A suggested starting point is the Host and Service Getting Starting Guide.
The ESX Virtualization website is one of the Top Virtualization blogs with daily updates. Virtualization of Physical systems, disaster recovery scenarios with fast backups and recovery. Those are the daily challenges I’m working on…
I’m working with VMware and Microsoft virtualization technologies, and as an IT admin since more than 15 years. To be able to successfully implement, deploy, manage and troubleshoot VMware vSphere installations, you can’t take VCP for granted.
The Center for Internet Security (CIS) is a 501(c)(3) organization dedicated to enhancing the cybersecurity readiness and response among public and private sector entities. Utilizing its strong industry and government partnerships, CIS combats evolving cybersecurity challenges on a global scale and helps organizations adopt key best practices to achieve immediate and effective defenses against cyber attacks. CIS is home to the Multi-State Information Sharing and Analysis Center (MS-ISAC), CIS Security Benchmarks, and CIS Critical Security Controls.
This guides tells you:
What you need to apply STIG Hardening to Security Analytics.
How to configure STIG Hardening.
What the OpenSCAP report is and how you generate it.
What exceptions were discovered in 10.6 and why they occurred.
We love technology and helping our customers — we get excited about computers and we love programming. We live to solve problems, code software, and make cool stuff happen. And, we love to share our creations with others.
WeeChat (Wee Enhanced Environment for Chat) is a free chat client, fast and light, designed for many operating systems.
This manual documents WeeChat chat client, it is part of WeeChat.
The vSphere CLI command set allows you to run common system administration commands against vSphere systems from an administration server of your choice.
ETSI, the European Telecommunications Standards Institute, produces globally-applicable standards for Information and Communications Technologies (ICT), including fixed, mobile, radio, converged, broadcast and Internet technologies. Our standards enable the technologies on which business and society rely.
Here we try to bring the knowledge of Network Professionals everywhere together in one place. Although the site is Cisco centric we welcome all type of topics from Juniper to SDN!
Cheatsheets and other resources for Network protocols, applications, syntaxes...
Discover original cyber security content provided by industry practioners, thought leaders, influencers, and innovative companies.
The complete FortiGate Cookbook is available for the following versions/formats:
5.4 (PDF | ePub | Mobi)
5.2 (PDF | ePub | Mobi)
5.0 (PDF)
4.3 (PDF)
Please note that the complete Cookbook is updated on an on-going basis and may not include the most recent recipes.
Technical Documentation Help
You can find technical server know-how directly from the employees of Thomas-Krenn.AG in the Thomas-Krenn-Wiki. The articles range from instructions about installation and configuration, technical details and concrete solutions to specific problems.