172 private links
Browse through our Knowledge Base
Welcome to the biggest and most updated BGP Looking Glass and Traceroute list in internet You´ll find out 1073 Looking Glass Servers updated at 02/14/2017. If you find a broken link, or you want to announce a new looking glass site, please feel free to send us an email to info@bgplookingglass.com.
This is a list of data sources that may be useful to cyber security. We are documenting these sources as part of an ongoing project, Stucco.
David Sharpe from GE-CIRT. So, mature CIRTs are supposed to have people hunting for APT, right? Don’t have a hunt team yet? Don’t know what to hunt for, or how or where to hunt? You are not alone. This talk will cover a range of effective and practical techniques that have worked over the years for finding targeted intrusions.
Hackmiami Conference 2016
FIRST brings together a variety of computer security incident response teams from government, commercial, and educational organizations. FIRST aims to foster cooperation and coordination in incident prevention, to stimulate rapid reaction to incidents, and to promote information sharing among members and the community at large.
Threat hunting is a popular topic these days, and there are a lot of people who want to get started but don’t know how. What should they hunt for? How should they perform the hunts? What data will they need to collect?
On the other hand, there are a lot of individuals out there who have written blog posts, conference presentations or whatever that detail some of their favorite hunting procedures. The problem is that these procedures are scattered all over the Internet, and are sometimes hard to find.
That’s why the ThreatHunting Project exists. Here you will find links to a number of different published hunting procedures. It my hope that this will give you some concrete starting points, or if you are an experienced hunter, help you find additional techniques to add to your repertoire.
Threat modeling is an approach for analyzing the security of an application. It is a structured approach that enables you to identify, quantify, and address the security risks associated with an application. Threat modeling is not an approach to reviewing code, but it does complement the security code review process. The inclusion of threat modeling in the SDLC can help to ensure that applications are being developed with security built-in from the very beginning.
This website is dedicated to internetworking documentation with FOSS.
It contains articles, guides, labs and presentations which can be used as
teaching or self learning material
As the documents have to be maintained over years, static web pages are the
most suitable way to publish them
The Companion to Media Studies and Digital Humanities is about researching media through new media: for example, playing games to better understand their politics and mechanics, exhibiting new media art to witness how people engage it, building stories to become more familiar with their structures and narratives, making wearable technologies to explore the overlaps between norms and fashion, or developing software to examine its relation to writing and literacy.
Agent nodes can’t retrieve their configurations
Is the Puppet master reachable from the agents?
Do your agents have signed certificates?
Do agents trust the master’s certificate?
Can agents reach the filebucket server?
Some common issues that can prevent the different parts of Puppet Enterprise from communicating with each other.
IBM® QRadar® Security Intelligence Platform provides a unified architecture for integrating security information and event management (SIEM), log management, anomaly detection, incident forensics, incident response, and configuration and vulnerability management.
This is a list of public packet capture repositories, which are freely available on the Internet.
Most of the sites listed below share Full Packet Capture (FPC) files, but some do unfortunately only have truncated frames.
I’ve managed to collect and create a lot of packet capture files over the past few years as a part of my teaching and learning, so I’ve decided to post some of those here. You are free to download and use these captures as you like with no restrictions. If you do find them useful however, I do ask you mention where they came from.
So you're at home tonight, having just installed Wireshark. You want to take the program for a test drive. But your home LAN doesn't have any interesting or exotic packets on it? Here's some goodies to try. Please note that if for some reason your version of Wireshark doesn't have zlib support, you'll have to gunzip any file with a .gz extension.
Search through 1,530,557 icons or browse 35,996 icon sets.
A danbooru-style image board, designed to be easier to install, run, and extend.
Requires a standard LAMP stack as provided by any normal web host. It can also use PostgreSQL as a database, which is recommended for high-load sites.
This is probably my most popular project, with a team of 10 coders, hundreds of installations, and thousands of users online at once.
Official website: http://code.shishnet.org/shimmie2/
Click on a link below to visit the page for each product version.
Below is a list of known issues in RSA Security Analytics 10.6, including those listed in the Release Notes. Please click on the links to go directly to the articles.
The following is an alphabetical list of supported event sources that are available in RSA NetWitness Logs.
La sécurité informatique est l'ensemble des moyens techniques, organisationnels, juridiques et humains nécessaires et mis en place pour conserver, rétablir, et garantir la sécurité des systèmes informatiques. Elle est intrinsèquement liée à la sécurité de l'information et des systèmes d'information.