172 private links
This collection is a presentation of fairly small Python programs. They are aimed at intermediate programmers; people who have studied Python and are fairly comfortable with basic recursion and object oriented techniques. Most programs are very short, not more than a couple of pages and all projects are accompanied with a write-up.
Rosetta Code is a programming chrestomathy site. The idea is to present solutions to the same task in as many different languages as possible, to demonstrate how languages are similar and different, and to aid a person with a grounding in one approach to a problem in learning another. Rosetta Code currently has 851 tasks, 203 draft tasks, and is aware of 658 languages, though we do not (and cannot) have solutions to every task in every language.
Pure-PHP implementations of:
BigIntegers
RSA
SSH2
SFTP
X.509
Symmetric key encryption
AES
Rijndael
Twofish
Blowfish
DES
3DES
RC4
RC2
phpseclib is designed to be ultra-compatible. It works on PHP4+ (PHP4, assuming the use of PHP_Compat) and doesn't require any extensions. For purposes of speed, mcrypt is used if it's available as is gmp or bcmath (in that order), but they are not required.
VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of live malicious code.
Malware Analysis Reports: Latest behavior analysis reports generated by Joe Sandbox
Check out our latest Analysis Reports of Evasive Malware
Windows
Android
Mac
iOS
Urbex
Links
OpenNews
ZeroBin
Autoblogs
We Fight Censorship
WFC via Tor SSL
Shaarli RSS
Ecirtam via Tor SSL
Open sources
Biographie
Blog & divers
Photos
Musique
Vidéos
Ami-e-s
Ceci est la page par défaut de ce serveur web. Le serveur web fonctionne et du contenu a été ajouté.
blog
shaarli
autoblogs
my repositories
zerobin
mycryptochat
media
Vous pouvez aussi visiter mon "site étudiant".
The Microsoft Security Response Center (MSRC) investigates all reports of security vulnerabilities affecting Microsoft products and services, and provides the information here as part of the ongoing effort to help you manage security risks and help keep your systems protected.
This schematic map shows a simplification of the world’s network of submarine fibre-optic cables.
In most cryptographic functions, the key length is an important security parameter. Both academic and private organizations provide recommendations and mathematical formulas to approximate the minimum key size requirement for security. Despite the availability of these publications, choosing an appropriate key size to protect your system from attacks remains a headache as you need to read and understand all these papers.
This web site implements mathematical formulas and summarizes reports from well-known organizations allowing you to quickly evaluate the minimum security requirements for your system. You can also easily compare all these techniques and find the appropriate key length for your desired level of protection. The lengths provided here are designed to resist mathematic attacks; they do not take algorithmic attacks, hardware flaws, etc. into account.
Here are some free harmonica tabs for beginning, intermediate and advanced harmonica players.
Harmonica tabs are easier to follow if the audio can be heard while watching the tab. The free harmonica tabs below use this method, the audio is provided with online players.
Computoser uses an algorithm to generate music. Each generated track is a unique combination of tones, rhythm and instruments.
The algorithm is currently experimental - it may generate both good and bad pieces. Feel free to mark the ones you like and the ones you dislike, so that I know how to improve the algorithm.
The performance may sound a bit artificial - that's because it's synthesized music - a computer can hardly have the performance of a human musician.
This webpage is a free malware analysis service powered by Payload Security that detects and analyzes unknown threats using a unique Hybrid Analysis technology.
This free malware analysis service is running VxStream Sandbox v6.70 in the backend. Supporting PE, Office, PDF, APK files and more (e.g. EML). Maximum upload size is 100 MB.
GOOGLE BIGQUERY
Entrepôt de données rapide, économique et intégralement géré, destiné à l'analyse de données à grande échelle dans les entreprises
Aujourd'hui, 247 milliards de mails transitent chaque jour par la toile. Quelle énergie le permet ? Propre en apparence, le monde virtuel est en réalité aussi .
RegExr is an online tool to learn, build, & test Regular Expressions (RegEx / RegExp).
Results update in real-time as you type.
Roll over a match or expression for details.
Save & share expressions with others.
Use Tools to explore your results.
Browse the Library for help & examples.
Undo & Redo with Ctrl-Z / Y.
Search for & rate Community patterns.
InfoByIp.com provides IP detection, geolocation and weather forecast. Both IPv4 and IPv6 are supported. Geolocation determines country, state and city of the IP address as well as latitude, longitude and altitude. In addition browsers properties are shown when displayed IP is the client IP. Browser properties include user agent, screen resolution and size, color depth, list of installed plugins, local time, java and flash support.
L’AHTI est une association née en 2000 pour encourager les travaux sur l’histoire des télécommunications et de l’informatique (TIC).
Elle a été créée à l’initiative de François du Castel et Michel Atten qui venaient de terminer un ouvrage sur l’Histoire des Ecoles supérieures de télécommunications, 1840-1997. De nombreuses personnalités du monde des TIC ont été consultées et l’AHTI a finalement été constituée en regroupant des anciens acteurs du secteur (de France Télécom bien sur, mais aussi de Bull, d’IBM, d’Alcatel, de SSII) et des historiens spécialisés du domaine.
About InfoSec
InfoSec Institute is the best source for high quality information security training. We have been training Information Security and IT Professionals since 1998 with a diverse lineup of relevant training courses. In the past 16 years, over 50,000 individuals have trusted InfoSec Institute for their professional development needs!