171 private links
The OASIS Cyber Threat Intelligence (CTI) TC supports automated information sharing for cybersecurity situational awareness, real-time network defense, and sophisticated threat analysis. STIX and TAXII.
The File Checksum Integrity Verifier (FCIV) is a command-prompt utility that computes and verifies cryptographic hash values of files. FCIV can compute MD5 or SHA-1 cryptographic hash values. These values can be displayed on the screen or saved in an XML file database for later use and verification.
Simplify the security assessment process with hosted vulnerability scanning tools.
La communauté FrameIP partage gratuitement ses documentations et codes source concernant le monde des réseaux TCPIP.
Visité par plus de 5000 personnes par jours, FrameIP.com nécessite un hébergement performant, une richesse des documentations et un entretient permanent.
Pour continuer à encore mieux partager, votre participation à la communauté sera la bienvenue.
sebsauvage.net est le site "perso" d'un internaute qui travaille dans l'informatique.
On y trouve:
Ses coups de gueule.
Des explications sur l'informatique.
Une sélection de logiciels.
Des conseils pour sécuriser votre ordinateur.
Diverses autres choses: programmation Python, un logiciel qui créé des images (webGobbler), des instructions pour créer gratuitement des PDF, etc.
New to the command-line world? Or just a little rusty? Or perhaps you can't always remember the arguments to lsof, or tar? Surely people could benefit from simplified man pages focused on practical examples.
This is a list of data sources that may be useful to cyber security. We are documenting these sources as part of an ongoing project, Stucco.
I am an independent security analyst providing cyber threat intelligence and network traffic associated with malware infections. I am located in the Albany, New York area.
All domains and URLs listed on this website should be considered as dangerous and could cause damage to your computer. We do not provide clickable active hyperlinks to these sites.
Use this website at your own risk!
Continuing TinyNuke Explained - part I, we review the available features of TinyNuke through the control panel, deploy a bot to our client machine, and perform attacks against our client.
In this video we review the setup requirements for installing and deploying TinyNuke.
FIRST brings together a variety of computer security incident response teams from government, commercial, and educational organizations. FIRST aims to foster cooperation and coordination in incident prevention, to stimulate rapid reaction to incidents, and to promote information sharing among members and the community at large.
A bit of my life. You can try to reach me: zen @ either fish2.com or trouble.org. I sometimes jot things down at trouble.
Various Security Technical Implementation Guides
Threat modeling is an approach for analyzing the security of an application. It is a structured approach that enables you to identify, quantify, and address the security risks associated with an application. Threat modeling is not an approach to reviewing code, but it does complement the security code review process. The inclusion of threat modeling in the SDLC can help to ensure that applications are being developed with security built-in from the very beginning.
This website is dedicated to internetworking documentation with FOSS.
It contains articles, guides, labs and presentations which can be used as
teaching or self learning material
As the documents have to be maintained over years, static web pages are the
most suitable way to publish them
Presentation video: Reverse-engineering CPUs for fun and profit
Technologue pro est un site éducatif collaboratif tunisien qui donne des cours en ligne gratuit, créé par des enseignants technologues aux instituts supérieurs des études technologiques (ISET), le site propose des ressources pédagogiques pour l'enseignement technologique et professionnel en Tunisie et offre plus de 150 cours en génie électrique et informatique, une base de données contenant plusieurs projets fin d'études et plusieurs autres modules pédagogiques.
Learn computer science, programming, and web development with us, your educational and entertaining super friends.
The Hello World Program and all associated educational videos and tutorials were created by Dototot and are licensed under a CC BY-NC-SA 4.0 License. Creative Commons License