171 private links
Simplify the security assessment process with hosted vulnerability scanning tools.
It is a complicated, arduous, and time-consuming task for even experienced system administrators to know what a reasonable set of security settings is for any operating system. Thus, the FIRST Best Practice Guide Library intends to assist FIRST Team Members and public in general in configuring their systems securely by providing configuration templates and security guidelines.
Also, this initiative aims at recognizing FIRST members' work and promote it outside the FIRST community.
BCN3D Technologies – Open Source 360º
BCN3D Technologies is a Fundació CIM project with a clear goal: change the way the world is made. We offer to society the possibility of having access to digital manufacturing technologies, including them as an active asset.
We design and create domestic and professional 3D printers in a way that the user can learn with every print, thanks to our Open Source working method. Thus we transfer to society all the technical learning obtained during our product development.
Bien le bonsoir oiseaux de nuit ou de jour,
J’ai rassemblé des services pour le bonheur des personnes intéressées par l’informatique.
Voici les différents services proposés sur https://www.lagout.org , tous issus du libre :
Zerobin : Partagez vos textes ou codes de manière simple et sécurisée.
Documentation: Base de connaissances portant sur l'informatique
Lutim : Hébergeur d’images
Serveur IRC : Venez échanger sur nos différents salons
Jyrafeau : Hébergeur de fichiers temporaires
Si vous avez de la doc à partager, contactez moi, je me ferais un plaisir de l’ajouter !
https://www.lagout.org/contact.html
Et si vous voulez m'aider à maintenir ce site :
https://www.lagout.org/dons.html
Merci de votre visite !
Greetings,
My name is Daniel, and I’m an information security practitioner and writer living in San Francisco, California. Most people come for my tutorials, my essays, or the podcast, but you can find some of my most popular content below.
Like telephone numbers there are directories that relate the IP addresses to names such as "cnn.com". These names are called domain names and the directories are run on servers called Domain Name Servers or DNS. A Reverse DNS Lookup queries these servers in an attempt to find a match.
Malware Analysis Reports: Latest behavior analysis reports generated by Joe Sandbox
Check out our latest Analysis Reports of Evasive Malware
Windows
Android
Mac
iOS
Le but de l’IILaR est de promouvoir la méthodologie de La RACHE. La RACHE, solution globale de génie logiciel, est un ensemble de techniques, de méthodes et de bonnes pratiques décrivant - des spécifications à la maintenance - comment produire du logiciel dans des conditions à peu près satisfaisantes et approximativement optimales.
The Ariel Query Language (AQL) is a structured query language that you use to communicate with the Ariel databases. Use AQL to query and manipulate event and flow data from the Ariel database.
The main purpose of the site is to promote "slightly skeptical" approach to IT, to stimulate critical thinking about system administration and software development as professions. To increase resistance to media brainwashing. Skepticism is generally any questioning attitude towards knowledge, facts, or opinions/beliefs stated as facts, or doubt regarding claims that are taken for granted elsewhere.
Browse through our Knowledge Base
I am an independent security analyst providing cyber threat intelligence and network traffic associated with malware infections. I am located in the Albany, New York area.
All domains and URLs listed on this website should be considered as dangerous and could cause damage to your computer. We do not provide clickable active hyperlinks to these sites.
Use this website at your own risk!
David Sharpe from GE-CIRT. So, mature CIRTs are supposed to have people hunting for APT, right? Don’t have a hunt team yet? Don’t know what to hunt for, or how or where to hunt? You are not alone. This talk will cover a range of effective and practical techniques that have worked over the years for finding targeted intrusions.
Hackmiami Conference 2016
Country Knowledgebase on SIGINT/COMINT Installations, and Vendors.
Signals intelligence (SIGINT) is intelligence-gathering by interception of signals, whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT). Signals intelligence is a subset of intelligence collection management.
TecAdmin.net is a blog was started on Feb 07, 2013 by Rahul Kumar. This was started with the goal of providing easy how to guides for Linux/Windows system administrators. We are always trying to provides high quality articles which would be easy to learn.
Things I've figured out how to do. This includes the Exim Cheatsheet, RPM Patching and Rebuilding Guide, Solaris DiskSuite Mirroring Guide, and numerous others.
If you are looking for official 10.6 documentation published by the RSA NetWitness Information Design and Development team -- user guides, release notes, installation instructions -- you are in the right place.
List all 10.6 user documentation (HTML and PDF): open the RSA Security Analytics 10.6 Table of Contents
List all documents in PDF format: click the PDFs category
List all guides in HTML format: click the Table of Contents category
List release documents--release notes, installation guides, and update instructions: click the Installation & Upgrade category
View translated 10.6 guides in PDF format: click French, Spanish, Japanese, or German
The following guides are the complete library for Security Analytics host and service configuration. Included are end-to-end initial setup and configuration instructions for each Security Analytics host and service, reference materials, and a database tuning guide. A suggested starting point is the Host and Service Getting Starting Guide.
The ESX Virtualization website is one of the Top Virtualization blogs with daily updates. Virtualization of Physical systems, disaster recovery scenarios with fast backups and recovery. Those are the daily challenges I’m working on…
I’m working with VMware and Microsoft virtualization technologies, and as an IT admin since more than 15 years. To be able to successfully implement, deploy, manage and troubleshoot VMware vSphere installations, you can’t take VCP for granted.
This guides tells you:
What you need to apply STIG Hardening to Security Analytics.
How to configure STIG Hardening.
What the OpenSCAP report is and how you generate it.
What exceptions were discovered in 10.6 and why they occurred.