172 private links
The teaching and research areas of interest are financial management, corporate finance, financial institutions and markets, international finance, and other related topics.
Do Not Track est une série documentaire personnalisée
consacrée à la vie privée et à l'économie du Web.
Pour accéder à nos comptes en ligne, nous utilisons souvent des mots de passe « faibles » ou le même mot de passe sur plusieurs comptes. Voici quelques astuces pour gérer ses mots de passe personnels en toute sécurité.
My Noob Life, communauté dédiée au partage de la connaissance liée aux technologies de l'information ainsi qu'à tout ce qui s'en approche. Tout le monde peut jouir du contenu proposé et aussi y contribuer.
Le but est simple: Mettre en commun des ressources pour que tout le monde en tire profit. Les outils ci-dessous sont mis à disposition pour rendre tout cela possible.
It is a complicated, arduous, and time-consuming task for even experienced system administrators to know what a reasonable set of security settings is for any operating system. Thus, the FIRST Best Practice Guide Library intends to assist FIRST Team Members and public in general in configuring their systems securely by providing configuration templates and security guidelines.
Also, this initiative aims at recognizing FIRST members' work and promote it outside the FIRST community.
Here's an overview of the various breaches that have been consolidated into this Have I Been Pwned. These are accessible programmatically via the HIBP API and also via the RSS feed.
For many years, DomainTools has served the domain professional community with Whois and domain name research tools to drive your investments, research buyers, find new domains and manage existing portfolios.
Bien le bonsoir oiseaux de nuit ou de jour,
J’ai rassemblé des services pour le bonheur des personnes intéressées par l’informatique.
Voici les différents services proposés sur https://www.lagout.org , tous issus du libre :
Zerobin : Partagez vos textes ou codes de manière simple et sécurisée.
Documentation: Base de connaissances portant sur l'informatique
Lutim : Hébergeur d’images
Serveur IRC : Venez échanger sur nos différents salons
Jyrafeau : Hébergeur de fichiers temporaires
Si vous avez de la doc à partager, contactez moi, je me ferais un plaisir de l’ajouter !
https://www.lagout.org/contact.html
Et si vous voulez m'aider à maintenir ce site :
https://www.lagout.org/dons.html
Merci de votre visite !
I-Blocklist is a service dedicated to the distribution of Internet Protocol address lists.
How does it work?
I-Blocklist distributes lists in standard formats including P2P, DAT, and CIDR.
Our lists can be used with software such as PeerBlock, PeerGuardian, iplist, Vuze, Transmission, uTorrent and, pfBlocker.
"Software that Works for Locksmiths"
Great Scott Gadgets makes open source hardware for innovative people.
Everything we produce at Great Scott Gadgets is open source, including all our hardware designs, software, and educational content. Our goal is to enable you to do things nobody has done before. We do that by building innovative hardware and software tools and by educating the community both online and through industry events. Most importantly, we support the community by releasing all of our work under open source licenses.
Remove a Google malware warning? This site provides website owners with information and tools to assist them in finding and removing hacks - malware, malicious redirects, phishing, spam from their sites.
This Knowledge Base was put together and is maintained by Roberto Salgado, Co-Founder of Websec. It is a compilation of books, papers, cheatsheets and testing done by Roberto over the years.
Guides & How-To
[May 29, 2007] - A complete Guide to Ris & Linux - Still a work in progress but almost complete
Clear your cache before downloading the guide, look the date as reference
Ris for Linux Tools: ris-linux-0.4.tar.gz
A working tftpd/samba session log, check it against your own log if you get problems
WINPE RIS from Linux - How to setup a ris server to boot winpe from network
RIS for Linux - Install windows using ris, without having a window server (multiplatform)
BINL protocol explained - Work in progress, Binl protocol analysis
Sources hosted on:
This page contains citations and references to information about Kerberos and related systems.
Papers and Documentation Describing Kerberos V5
Tutorials
Papers
Protocol Specifications
Proposed Protocol Extensions
Application Programming Interface
Using Kerberos for Authorization
Papers and Documentation Describing Kerberos V4
Tutorials
Papers
Protocol Specifications
Discussion and Critiques of Kerberos
Variants and Derivatives of Kerberos
This dialogue provides a fictitious account of the design of an open-network authentication system called "Charon." As the dialogue progresses, the characters Athena and Euripides discover the problems of security inherent in an open network environment. Each problem must be addressed in the design of Charon, and the design evolves accordingly. Athena and Euripides don't complete their work until the dialogue's close.
When they finish designing the system, Athena changes the system's name to "Kerberos," the name, coincidentally enough, of the authentication system that was designed and implemented at MIT's Project Athena. The dialogue's "Kerberos" system bears a striking resemblence to the system described in Kerberos: An Authentication Service for Open Network Systems presented at the Winter USENIX 1988, at Dallas, Texas.
Online resources
README
Welcome to lagout.org !
If you want to make a copy of this website, go ahead, the server can handle the load !
If you think that the library should have new documents, tell us !
The Open Book Project is aimed at the educational community and seeks to encourage and coordinate collaboration among students and teachers for the development of high quality, freely distributable textbooks and educational materials on a wide range of topics. The advent of the Internet and the World Wide Web are making collaboration among educators on a global scale possible for the first time. We want to harness this exciting technology to promote learning and sharing.