Bookmarks - wr0ng.name
Tag cloud
Picture wall
Daily
Plugins
  • ► Play Videos
RSS Feed
  • RSS Feed
  • ATOM Feed
  • Daily Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Display

Filter untagged links
16 results tagged bestpractices  ✕
Cisco Firewall Best Practices https://tools.cisco.com/security/center/resources/firewall_best_practices
Fri 18 Oct 2019 02:41:06 PM CEST
QRCode
archive.org
This document provides administrators and engineers guidance on securing Cisco firewall appliances, which increases the overall security of an end-to end architecture. The functions of network devices are structured around three planes: management, control, and data. This document is structured around security operations (best practices) and the three functional planes of a network. In addition, this document provides an overview of each included feature and references to related documentation. For the purposes of this document, all mentions of "Cisco firewall" refer explicitly to the Cisco ASA Adaptive Security Appliances, though the concepts may apply to other firewall and security devices.
bestpractices cisco configuration documentation knowledge networking online security useful
Secure Engineering & Your QRadar App - QRadar App Development https://developer.ibm.com/qradar/2018/01/15/secure-engineering-qradar-app/
Mon 15 Jul 2019 05:20:56 PM CEST
QRCode
archive.org
thumbnail
Application security is vitally important for every software project, especially so for security projects. This is why the validation process for QRadar app submissions go through a secure engineering review. As a member of the secure development team, this blog post will hopefully give you (the app developer) some insight regarding what to expect during our app validation process.
applications bestpractices blog development ibm it online project qradar security web
IBM QRadar: Software update checklist for administrators https://www-01.ibm.com/support/docview.wss?uid=ibm10738599
Mon 15 Jul 2019 11:07:31 AM CEST
QRCode
archive.org
What steps can administrators review before they attempt to update their QRadar deployment?

bestpractices checklist ibm it knowledge online qradar resources security tech updates
QRadar Upgrade Guide https://www.ibm.com/support/knowledgecenter/SS42VS_7.3.1/com.ibm.qradar.doc/b_qradar_upgrade.pdf?view=kc
Tue 09 Jul 2019 02:02:56 PM CEST
QRCode
archive.org
Introduction & Processes to upgrading QRadar software.
bestpractices ibm knowledge qradar security updates
Chiffrer.info – Parce que les mots sont importants https://chiffrer.info/
Tue 28 Nov 2017 01:30:03 PM CET
QRCode
archive.org
thumbnail
ON DIT CHIFFRER, ET PAS CRYPTER. :-)
bestpractices crypto knowledge vocabulary
Les conseils de la CNIL pour un bon mot de passe | CNIL https://www.cnil.fr/fr/les-conseils-de-la-cnil-pour-un-bon-mot-de-passe
Tue 17 Oct 2017 01:34:15 PM CEST
QRCode
archive.org
thumbnail
Pour accéder à nos comptes en ligne, nous utilisons souvent des mots de passe « faibles » ou le même mot de passe sur plusieurs comptes. Voici quelques astuces pour gérer ses mots de passe personnels en toute sécurité.
bestpractices knowledge password privacy security
FIRST Best Practices Guide https://www.first.org/resources/guides/
Thu 14 Sep 2017 10:51:06 AM CEST
QRCode
archive.org
thumbnail
It is a complicated, arduous, and time-consuming task for even experienced system administrators to know what a reasonable set of security settings is for any operating system. Thus, the FIRST Best Practice Guide Library intends to assist FIRST Team Members and public in general in configuring their systems securely by providing configuration templates and security guidelines.

Also, this initiative aims at recognizing FIRST members' work and promote it outside the FIRST community.
bestpractices community configuration internet knowledge security systems tech
Keylength - BSI Cryptographic Key Length Report (2017) https://www.keylength.com/en/8/
Fri 23 Jun 2017 10:06:59 AM CEST
QRCode
archive.org
In most cryptographic functions, the key length is an important security parameter. Both academic and private organizations provide recommendations and mathematical formulas to approximate the minimum key size requirement for security. Despite the availability of these publications, choosing an appropriate key size to protect your system from attacks remains a headache as you need to read and understand all these papers.
This web site implements mathematical formulas and summarizes reports from well-known organizations allowing you to quickly evaluate the minimum security requirements for your system. You can also easily compare all these techniques and find the appropriate key length for your desired level of protection. The lengths provided here are designed to resist mathematic attacks; they do not take algorithmic attacks, hardware flaws, etc. into account.
bestpractices crypto knowledge research security
NSA OSS Technologies https://nationalsecurityagency.github.io/
Mon 19 Jun 2017 02:28:26 PM CEST
QRCode
archive.org
THE TECHNOLOGIES LISTED BELOW were developed within the National Security Agency (NSA) and are now available to the public via Open Source Software (OSS). The NSA Technology Transfer Program (TTP) works with agency innovators who wish to use this collaborative model for transferring their technology to the commercial marketplace. OSS invites cooperative development of technology, encouraging broad use and adoption. The public benefits by adopting, enhancing, adapting, or commercializing the software. The government benefits from the open source community’s enhancements to the technology.
agencies analytics automation bestpractices opensource repository share tools
Spotting the Adversary with Windows Event Log Monitoring (v2) https://www.iad.gov/iad/library/ia-guidance/security-configuration/applications/spotting-the-adversary-with-windows-event-log-monitoring.cfm
Mon 19 Jun 2017 02:26:59 PM CEST
QRCode
archive.org
This paper focuses on using the built-in tools already available in the Microsoft Windows operating system (OS). Central event log collection requires a Windows Server operating system version 2003 R2 or above. Many commercially available tools exist for central event log collection. Using a Windows Server 2008 R2 or above server version is recommended. There are no additional licensing costs for using the event log collection feature. The cost of using this feature is based on the amount of additional storage hardware needed to support the amount of log data collected. This factor is dependent on the number of workstations within the local log collection network.
analysis bestpractices logs security windows
Download Windows 10 and Windows Server 2016 security auditing and monitoring reference from Official Microsoft Download Center https://www.microsoft.com/en-us/download/details.aspx?id=52630
Mon 19 Jun 2017 02:24:57 PM CEST
QRCode
archive.org
thumbnail
You can record and store security audit events for Windows 10 and Windows Server 2016 to track key system and network activities, monitor potentially harmful behaviors, and mitigate risks. You control the amount of data you collect by controlling the categories of security events you audit, for example, changes to user account and resource permissions, failed attempts to access resources, and attempts to modify system files. The reference in this download can help you decide what to monitor and how to interpret the data you collect.
analytics bestpractices security server systems windows
Symfony Best Practices (current) http://symfony.com/doc/current/best_practices/index.html
Wed 10 May 2017 01:18:45 PM CEST
QRCode
archive.org
thumbnail
Discover the best practices that fit the philosophy of the framework as envisioned by its original creator Fabien Potencier. Learn a new pragmatic vision for Symfony application development and boost your productivity.
bestpractices books development documentation framework knowledge php project
La Méthode R.A.C.H.E - International Institute of La RACHE http://www.la-rache.com/index.html
Fri 28 Apr 2017 04:26:18 PM CEST
QRCode
archive.org
thumbnail
Le but de l’IILaR est de promouvoir la méthodologie de La RACHE. La RACHE, solution globale de génie logiciel, est un ensemble de techniques, de méthodes et de bonnes pratiques décrivant - des spécifications à la maintenance - comment produire du logiciel dans des conditions à peu près satisfaisantes et approximativement optimales.
bestpractices framework fun knowledge tech
Top 10 Developer Crypto Mistakes https://littlemaninmyhead.wordpress.com/2017/04/22/top-10-developer-crypto-mistakes/
Wed 26 Apr 2017 08:08:22 PM CEST
QRCode
archive.org
thumbnail
After doing hundreds of security code reviews for companies ranging from small start-ups to large banks and telcos, and after reading hundreds of stack overflow posts on security, I have composed a list of the top 10 crypto problems I have seen.
bestpractices code list project security
The Power of 10: Rules for Developing Safety- Critical Code http://www.spinroot.com/gerard/pdf/Power_of_Ten.pdf
Wed 15 Mar 2017 12:31:52 PM CET
QRCode
archive.org
Adhering to a set of 10 verifiable coding rules can make the analysis of critical software components more reliable.

Gerard J. Holzmann
NASA/JPL Laboratory for Reliable Software

http://ieeexplore.ieee.org/abstract/document/1642624/
bestpractices development knowledge resources software
posters/accessibility at master · UKHomeOffice/posters · GitHub https://github.com/UKHomeOffice/posters/tree/master/accessibility
Tue 13 Dec 2016 02:54:13 PM CET
QRCode
archive.org
thumbnail
Home Office Digital repository of posters covering different topics - research, access needs, accessibility, design.
accessibility bestpractices development project
759 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn