171 private links
The main problem with an ESXi home lab running 7/7 is usually one factor – Power consumption as a primary ongoing cost. Especially when you run a lab with a several hosts. Additional factors like cooling or noise can be usually solved by moving the server(s) to the separate room with natural airflow, but the power consumption is something that you have to plan ahead and you’ll be dealing with during the lifetime of the lab. So in this post we’ll look at some possibilities to build an Energy Efficient ESXi Home Lab Host. The post is part of an article series starting here.
What are wheels?
Wheels are the new standard of Python distribution and are intended to replace eggs. Support is offered in pip >= 1.4 and setuptools >= 0.8.
Advantages of wheels
Faster installation for pure Python and native C extension packages.
Avoids arbitrary code execution for installation. (Avoids setup.py)
Installation of a C extension does not require a compiler on Windows or macOS.
Allows better caching for testing and continuous integration.
Creates .pyc files as part of installation to ensure they match the Python interpreter used.
More consistent installs across platforms and machines
Tor Exit Node Query | TorStatus Server Details | Advanced Query Options | Advanced Display Options | Network Statistic Summary | Network Statistic Graphs
CSV List of Current Result Set | CSV List of All Current Tor Server IP Addresses | CSV List of All Current Tor Server Exit Node IP Addresses
List of AS by Router Count, sorted by router count | List of AS by Exit Router Count, sorted by router count | List of AS by Router Count, sorted by bandwidth | List of AS by Exit Router Count, sorted by bandwidth
A curated list of awesome Go frameworks, libraries and software. Inspired by awesome-python.
Pour les gens n'étant pas familiers avec les sites de challenges, un site de challenges est un site proposant en particulier des problèmes relatifs à l'informatique. Il existe de nombreux types de challenges. Les plus communs sont les suivants : Cryptographie, Crackme, Stéganographie, Programmation, Logique et Maths/Science. La difficulté de ces épreuves varie de même.
This page lists some good books recommended by current and past students for a variety of subjects related to the degree. Feel free to add books as you read them if they are relevant!
Books for the Interested Reader
HashKiller's purpose is to serve as a meeting place for computer hobbyists, security researchers and penetration testers. It serves as a central location to promote greater security on the Internet by demonstrating the weakness of using hash based storage / authentication.
Netflix doesn’t publish a list of all those genres, so we’ve done the hard work and created the world’s largest list of Netflix genres with over 27,002 genres. You can see the full list below, and you can filter it according to genre, description and decade. Click on the link for any genre to open it in Netflix, right in your browser. (For instance, “Biographical 20th Century Period Pieces About Fame” is genre 77456.)
After doing hundreds of security code reviews for companies ranging from small start-ups to large banks and telcos, and after reading hundreds of stack overflow posts on security, I have composed a list of the top 10 crypto problems I have seen.
A curated list of movies every hacker & cyberpunk must watch.
"CERT" is a registered trademark owned by Carnegie Mellon University. Computer security incident response teams (CSIRTs) that share our commitment to improving the security of networks connected to the internet may apply for authorization to use the "CERT" mark in their names.
The following CSIRTs have been approved to use "CERT."
At its core, the Common Weakness Enumeration (CWE™) is a list of software weaknesses types. Creating the list is a community initiative aimed at creating specific and succinct definitions for each common weakness type. By leveraging the widest possible group of interests and talents, the hope is to ensure that item in the list is adequately described and differentiated.he community using this information.
Welcome to the biggest and most updated BGP Looking Glass and Traceroute list in internet You´ll find out 1073 Looking Glass Servers updated at 02/14/2017. If you find a broken link, or you want to announce a new looking glass site, please feel free to send us an email to info@bgplookingglass.com.
This is a list of data sources that may be useful to cyber security. We are documenting these sources as part of an ongoing project, Stucco.
Cisco Services for IPS protects and enhances the effectiveness of the Cisco Intrusion Prevention System. Supported by the Cisco Global Security Intelligence organization, Cisco Services for IPS delivers continuously updated, comprehensive, and accurate detection technology to identify and block fast-moving and emerging threats.
Below is a list of known issues in RSA Security Analytics 10.6, including those listed in the Release Notes. Please click on the links to go directly to the articles.
The following is an alphabetical list of supported event sources that are available in RSA NetWitness Logs.
RSA NetWitness ESA Correlation Rules / Alerts available by default on the plateform
Ransomware Tracker tracks and monitors the status of domain names, IP addresses and URLs that are associated with Ransomware, such as Botnet C&C servers, distribution sites and payment sites.
Ransomware Tracker provides a short guideline for both home users and enterprises on how to avoid becoming a victim of Ransomware.
Ransomware Tracker offers various blocklists. These blocklists allows enterprises to block malicious traffic towards known Ransomware infrastructure at the network edge, e.g. by blocking them on the corporate firewall, web proxy or in the local DNS server.