Bookmarks - wr0ng.name
Tag cloud
Picture wall
Daily
Plugins
  • ► Play Videos
RSS Feed
  • RSS Feed
  • ATOM Feed
  • Daily Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Display

Filter untagged links
13 results tagged network  ✕
Online PCAP Analyzer https://pcap.honeynet.org.my/v1/
Mon 18 May 2020 01:52:12 PM CEST
QRCode
archive.org
MyPcapAnalyzer is a service that analyzes pcap files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by Intrution Detection Engines and other rulesets.
analysis forensics free network online security tool
Cellular Tower and Signal Map https://www.cellmapper.net/map
Thu 06 Feb 2020 11:17:35 PM CET
QRCode
archive.org
CellMapper is a crowd-sourced cellular tower and coverage mapping service.
knowledge map mobile network tools
WiGLE: Wireless Network Mapping https://wigle.net/index
Thu 02 Jan 2020 01:33:22 AM CET
QRCode
archive.org
We consolidate location and information of wireless networks world-wide to a central database, and have user-friendly desktop and web applications that can map, query and update the database via the web.

We currently accept files in any of:

    DStumbler: text output
    G-Mon: .kml, .txt output
    inSSIDer: kml output
    Kismac: native (.kismac), text, kml output
    Kismet: .csv, .xml, .netxml, .gps, .gpsxml, .nettxt, CWGD output
    MacStumbler: plist xml, wiscan format
    NetStumbler: native (.ns1), text, wiscan, summary
    Pocket Warrior: Text output
    Wardrive-Android: kml output
    WiFiFoFum: kml, kmz output
    WiFi-Where: ns1, kml, csv output. Now available on Cydia (iphone/ipad jailbreak)
    Wigle Wifi Wardriving: csv output
    Consolidated.db: This is an sqlite file that is synced from an iphone/ipad to a host computer (prior to iOS 4.3.3).
map network online privacy resources tracking wifi
CERT NetSA Security Suite https://tools.netsa.cert.org/index.html
Tue 24 Sep 2019 11:57:07 AM CEST
QRCode
archive.org
The Network Situational Awareness (NetSA) group at CERT has developed and maintains a suite of open source tools for monitoring large-scale networks using flow data. These tools have grown out of the work of the AirCERT project, the SiLK project and the effort to integrate this work into a unified, standards-compliant flow collection and analysis platform.

If you are new to the NetSA Security Suite, start with this overview of the components that comprise the NetSA Security Suite and their inter-operation.

CERT is a part of the Software Engineering Institute (SEI), a federally funded research and development center (FFRDC) operated by Carnegie Mellon University.
analysis backbone internet network online security tools
What Really Happens On Your Network? Part Seven – Pi-hole®: A black hole for Internet advertisements https://pi-hole.net/2018/09/14/what-really-happens-on-your-network-part-seven/
Sat 27 Jul 2019 08:48:45 PM CEST
QRCode
archive.org
We’re back with the latest iteration of users discovering things on their network via Pi-hole.  This post is a compilation of things users have discovered over the past year.  Some were bad, some were interesting, and some were enlightening.  This isn’t the first time we’ve written a post like this, but we will try to go into more detail about what people have discovered and group together similar discoveries.  Below you’ll find previous renditions of this type of post.
blog dns knowledge network online opensource
Piratage du télégraphe Chappe — Wikipédia https://www.wikipedia.org/wiki/Piratage_du_t%C3%A9l%C3%A9graphe_Chappe
Tue 09 Oct 2018 05:21:20 PM CEST
QRCode
archive.org
Le Piratage du télégraphe Chappe est un détournement du réseau de télégraphie optique entrepris par deux hommes d'affaires bordelais, Louis et François Blanc, entre 1834 et 1836, afin de connaître avant tout le monde la clôture des cours de la rente à la Bourse de Paris.

Le piratage a été rendu possible par la corruption d'un agent télégraphique de Tours, qui ajoutait discrètement le chiffre du cours aux messages envoyés par l'État.

La divulgation de cette manœuvre a contribué au vote de la loi de 1837 sur le monopole public des communications télégraphiques. Il s'agit peut-être d'un des premiers cas de hacking, les frères Blanc exploitant une faille structurelle dans un réseau de télécommunication.
hacking history network security
Dashboard - SANS Internet Storm Center https://isc.sans.edu/dashboard.html
Fri 07 Jul 2017 12:05:15 PM CEST
QRCode
archive.org
thumbnail
SANS Dashboard:
Network Activity; Offensive IPs; Ports by Unique Sources; Ports by Unique Targets; Ports by Total Activity; StormCast; Diaries; Lastest Vulnerabilities
analytics free network online security stats tools
Suricata | Open Source IDS / IPS / NSM engine https://suricata-ids.org/
Fri 23 Jun 2017 02:05:57 PM CEST
QRCode
archive.org
thumbnail
Suricata is a free and open source, mature, fast and robust network threat detection engine. The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing.
Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. Suricata’s fast paced community driven development focuses on security, usability and efficiency.
The Suricata project and code is owned and supported by the Open Information Security Foundation (OISF), a non-profit foundation committed to ensuring Suricata’s development and sustained success as an open source project.
analysis network online opensource security tools
coordination & support action ECRYPT-CSA | research network ECRYPT-NET http://www.ecrypt.eu.org/
Thu 08 Jun 2017 04:16:14 PM CEST
QRCode
archive.org
ECRYPT-CSA is a Coordination & Support Action funded by the European Union's H2020 programme. The project consists of four academic and one industrial partner.
ECRYPT-NET is a research network of six universities and two companies, as well as 7 associated companies, funded by a Marie Skłodowska-Curie ITN (Integrated Training Network) grant.
network online research resources security
Hurricane Electric Internet Services - Internet Backbone Colocation Provider http://he.net/
Wed 10 May 2017 03:20:39 PM CEST
QRCode
archive.org
Hurricane Electric operates its own global IPv4 and IPv6 network and is considered the largest IPv6 backbone in the world as measured by number of networks connected. Within its global network, Hurricane Electric is connected to over 150 major exchange points and exchanges traffic directly with more than 6,000 different networks. Employing a resilient fiber-optic topology, Hurricane Electric has no less than four redundant paths crossing North America, two separate paths between the U.S. and Europe, and rings in Europe and Asia. In addition to its vast global network, Hurricane Electric owns and operates two data centers in Fremont, California - including Hurricane Electric Fremont 2, its newest 200,000 square-foot facility. Hurricane Electric offers IPv4 and IPv6 transit solutions over the same connection. Connection speeds available include 100GE (100 gigabits/second), 10GE, and gigabit ethernet.
internet knowledge network telecommunications tools
BroadAnalysis – Threat Intelligence and Malware Research http://www.broadanalysis.com
Mon 10 Apr 2017 10:03:57 AM CEST
QRCode
archive.org
I am an  independent security analyst providing cyber threat intelligence and network traffic associated with malware  infections. I am located in the Albany, New York area.
All domains and URLs listed on this website should be considered as dangerous and could cause damage to your computer. We do not provide clickable active hyperlinks to these sites.

Use this website at your own risk!
analysis computing knowledge malware network research security tech
Secure distribution of RPM packages - Red Hat Customer Portal https://access.redhat.com/blogs/766093/posts/1976693
Wed 29 Mar 2017 03:57:53 PM CEST
QRCode
archive.org
thumbnail
This blog post looks at the final part of creating secure software: shipping it to users in a safe way. It explains how to use transport security and package signatures to achieve this goal.
configuration knowledge linux network security updates
Anti-Spam - Filtrage Statistique http://igm.univ-mlv.fr/~dr/XPOSE2007/fthomann_sujet/filtrage_stat.html
Mon 13 Feb 2017 09:30:46 AM CET
QRCode
archive.org
Utilise la technique dite: "des réseaux bayesiens", décrit dans un article de Paul Graham.

Le filtre calcule des probabilités conditionnelles en fonction des informations observées (situées dans une base de données); chaque mot d'un message est évalué suivant les probabilités qu'il se trouve dans un message défini comme indésirable ou non.
algorithm internet maths network theory
759 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn