172 private links
The "Dont Be a Dick" Public License
As developers we all want to protect our code from dicks that try to steal, sell, infringe or just generally rip us off. For this we have licenses like GPL, MIT, etc.
Sometimes however, you release a project where you just don't care what happens to the code. For this Sam Hocevar created the WTFPL which is a brilliant license.
This package contains sample Python code that demonstrates how to use the QRadar REST API. The API is accessed by sending specially crafted HTTP requests to specific URLs on the QRadar console. These URLs, known as "endpoints", each perform a specific function. Some endpoints perform different functions depending on whether you send a GET, POST, or DELETE request. By linking together calls to these endpoints you can implement you own custom business processes or integrate QRadar data with external systems.
Discover 180+ French startups leveraging AI in a variety of applications
We believe Artificial Intelligence (AI) will usher the next revolution in technology and accelerate the disruptions in almost every industry.
FRANCE IS AI mission is to support and promote the French Artificial Intelligence ecosystem both locally and internationally, while building bridges with the other AI hubs.
theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis we have decided to gather all of them for you in an available and safe way. theZoo was born by Yuval tisf Nativ and is now maintained by Shahak Shalev.
Github: https://github.com/ytisf/theZoo
A curated list of movies every hacker & cyberpunk must watch.
LibreTaxi makes ridesharing affordable by getting rid of the third party between passengers and drivers. Negotiate the price before the ride is confirmed, pay cash upon arrival. 1-minute hiring for all drivers.
New to the command-line world? Or just a little rusty? Or perhaps you can't always remember the arguments to lsof, or tar? Surely people could benefit from simplified man pages focused on practical examples.
"CERT" is a registered trademark owned by Carnegie Mellon University. Computer security incident response teams (CSIRTs) that share our commitment to improving the security of networks connected to the internet may apply for authorization to use the "CERT" mark in their names.
The following CSIRTs have been approved to use "CERT."
Web-based news feed aggregator, designed to allow you to read news from any location, while feeling as close to a real desktop application as possible.
HAL is an open archive where authors can deposit scholarly documents from all academic fields.
For the attention of the authors
The deposit must be made in agreement with the co-authors and in the respect for the policy of the publishers.
The deposit is subject of a control, HAL reserves the right to refuse items that do not meet the criteria of the archive.
Any deposit is definitive, no withdrawals will be made after the on-line posting of the publication.
Text files in pdf format or image files are sent to CINES for long-term archiving.
For the attention of the readers
In a context of electronic distribution, every author keep all its intellectual property rights.
Ce site et ses graphiques sont réalisés à partir de données issues de As24904 du Fournisseur d'accès internet K-Net.
Mes remerciements à Vivien & Lafibre.info, Jack pour leur collaboration.
Ce site utilise ChartJs pour générer les graphiques.
Contact, remarques, signalements de bugs: TiTiDu01, ou sur lafibre.info.
IBM X-Force Exchange Threat Feed Manager
Introducing threat feed manager: you can now view external sources of threat intelligence within XFE.
IBM X-Force Exchange is a threat intelligence sharing platform enabling research on security threats, aggregation of intelligence, and collaboration with peers.
Browse, Download, Use. qRadar extensions verified for a better security.
The Ariel Query Language (AQL) is a structured query language that you use to communicate with the Ariel databases. Use AQL to query and manipulate event and flow data from the Ariel database.
WebPulse contains a database of over 15 million entries and is growing every day. It provides URL identification to the PacketShaper via requests to WebPulse service points located across the globe. Each service point is periodically pinged in order to ensure that category, application, and operation IDs are provided from the fastest service point.
SixXS (Six Access) is a free, non-profit, non-cost service for Local Internet Registries (LIR's) and endusers. The main target is to create a common portal to help company engineers find their way with IPv6 networks deploying IPv6 to their customers in a rapid and controllable fashion. To reach these targets we are providing a whitelabel IPv6 Tunnel Broker and Ghost Route Hunter, an IPv6 route monitoring tool and various other services to help out where needed.
Start developing with product trials, free downloads, and IBM Bluemix services. Sort by topic or product name and find everything we have to offer.
NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
NVD is a product of the NIST Computer Security Division, Information Technology Laboratory and is sponsored by the Department of Homeland Security’s National Cyber Security Division.
The two visualizations on this page are simple graphs which provide different views of how the assignment of vulnerability types has changed over time.
At its core, the Common Weakness Enumeration (CWE™) is a list of software weaknesses types. Creating the list is a community initiative aimed at creating specific and succinct definitions for each common weakness type. By leveraging the widest possible group of interests and talents, the hope is to ensure that item in the list is adequately described and differentiated.he community using this information.