4337 links
  • Arnaud's links
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
◄Older
page 1 / 3
56 results tagged security x
  • thumbnail
    GitHub - kubescape/kubescape: Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.
    26 avril 2023 à 20:08:13 UTC+2 - permalink - archive.org - https://github.com/kubescape/kubescape
    k8s security tools
  • thumbnail
    safety · PyPI
    9 mars 2023 à 16:30:56 UTC+1 - permalink - archive.org - https://pypi.org/project/safety/
    python scan security
  • thumbnail
    Flipper Zero — Portable Multi-tool Device for Geeks
    31 août 2022 à 09:49:03 UTC+2 - permalink - archive.org - https://flipperzero.one/
    device hack secu security
  • thumbnail
    GitHub - armosec/kubescape: Kubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
    7 mars 2022 à 15:48:55 UTC+1 - permalink - archive.org - https://github.com/armosec/kubescape
    k8s security
  • thumbnail
    GitHub - jazzband/django-axes: Keep track of failed login attempts in Django-powered sites.
    30 novembre 2020 à 15:08:15 UTC+1 - permalink - archive.org - https://github.com/jazzband/django-axes
    django security
  • thumbnail
    Introducing BusKill: A Kill Cord for your Laptop - Michael Altfield's Tech Blog

    Nice!

    6 janvier 2020 à 11:51:49 UTC+1 - permalink - archive.org - https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/
    security
  • thumbnail
    CPDoS: Cache Poisoned Denial of Service
    23 octobre 2019 à 17:50:53 UTC+2 - permalink - archive.org - https://cpdos.org/
    security
  • Conférence sur l’analyse de malwares – Korben

    interessant, ça a l'air sympa comme job!

    TIL : strings command

    23 mars 2018 à 11:38:49 UTC+1 - permalink - archive.org - https://korben.info/conference-sur-lanalyse-de-malwares.html
    conf ovh security
  • thumbnail
    buildkite/sockguard: A proxy for docker.sock that enforces access control and isolated privileges
    13 décembre 2017 à 09:02:14 UTC+1 - permalink - archive.org - https://github.com/buildkite/sockguard
    docket security socket
  • How can I see which sites have set the HSTS flag in my browser? - Information Security Stack Exchange

    Un peu une saloperie ce HSTS tout de même

    Chrome:

    Open Chrome
    Type chrome://net-internals/#hsts in the address bar of chrome
    Query domain: if it appears as a result, it is HSTS enabled

    Firefox:

    Open file explorer
    Copy paste %APPDATA%\Mozilla\Firefox\Profiles\ in the address bar of file explorer (for Linux it is ~/.mozilla/firefox)
    Double click the folder you see (if you have multiple FF profiles, there will be multiple folders)
    Open SiteSecurityServiceState.txt. This textfile contains sites that have enabled HSTS.
    20 octobre 2016 à 12:21:27 UTC+2 - permalink - archive.org - http://security.stackexchange.com/questions/92954/how-can-i-see-which-sites-have-set-the-hsts-flag-in-my-browser
    browser hsts https security ssl
  • How to Automatically Tag Amazon EC2 Resources in Response to API Events - AWS Security Blog

    Intéressant comme workflow, l'objectif est de laisser les users/soft créer des EC2 comme ils veulent et avoir les droits seulement sur les EC2 qu'ils ont créé.

    Comment ça marche ? auto tagging des EC2 avec l'userid à la création couplé avec une policy qui autorise les action seulement si le tag avec l'userid est présent.

    pacon

    Dans le meme genre sans l'auto tagging :
    http://blogs.aws.amazon.com/security/post/Tx29HCT3ABL7LP3/Resource-level-Permissions-for-EC2-Controlling-Management-Access-on-Specific-Ins

    10 octobre 2016 à 15:09:55 UTC+2 - permalink - archive.org - https://blogs.aws.amazon.com/security/post/Tx150Z810KS4ZEC/How-to-Automatically-Tag-Amazon-EC2-Resources-in-Response-to-API-Events
    aws security
  • NVD - FAQ

    What is the difference between the NVD and the Common Vulnerabilities and Exposures (CVE) standard vulnerability dictionary?
    The NVD is the CVE dictionary augmented with additional analysis, a database, and a fine-grained search engine. The NVD is a superset of CVE. The NVD is synchronized with CVE such that any updates to CVE appear immediately on the NVD.

    10 août 2016 à 15:55:35 UTC+2 - permalink - archive.org - https://nvd.nist.gov/faq#d18d52fd-d1c7-44a5-b417-f2210724d433
    security
  • My First 10 Minutes On a Server - Primer for Securing Ubuntu
    19 juin 2016 à 20:01:56 UTC+2 - permalink - archive.org - http://www.codelitt.com/blog/my-first-10-minutes-on-a-server-primer-for-securing-ubuntu/
    security
  • How to Safely Store Your Users' Passwords in 2016 - Paragon Initiative Enterprises Blog
    16 juin 2016 à 15:05:04 UTC+2 - permalink - archive.org - https://paragonie.com/blog/2016/02/how-safely-store-password-in-2016
    password security
  • Cross-origin resource sharing - Wikipedia, the free encyclopedia

    Petite piqûre de rappel, ça ne fait pas de mal

    19 mai 2016 à 15:34:59 UTC+2 - permalink - archive.org - https://en.wikipedia.org/wiki/Cross-origin_resource_sharing
    ajax cors origin request security web
  • Detecting the use of "curl | bash" server side | Application Security

    :o

    22 avril 2016 à 14:18:49 UTC+2 - permalink - archive.org - https://www.idontplaydarts.com/2016/04/detecting-curl-pipe-bash-server-side/
    bash curl security
  • GitHub - future-architect/vuls: Vulnerability scanner for Linux, agentless, written in golang.

    via doo

    19 avril 2016 à 14:51:03 UTC+2 - permalink - archive.org - https://github.com/future-architect/vuls/
    security
  • DROWN Attack
    1 mars 2016 à 14:30:48 UTC+1 - permalink - archive.org - https://www.drownattack.com/
    openssl security
  • Distribution packages considered insecure

    Via twitter

    15 février 2016 à 08:28:33 UTC+1 - permalink - archive.org - https://statuscode.ch/2016/02/distribution-packages-considered-insecure/?utm_content=buffer587de&utm_medium=social
    arch docker package rolling security
  • Archived content - Nmap tutorial

    La raison pour laquelle on voit des block en OUPUT de certains type ICMP dans les scripts iptables :

    Scanning for open UDP ports is done with the -sU option. With this scan type, Nmap sends 0-byte UDP packets to each target port on the victim. Receipt of an ICMP Port Unreachable message signifies the port is closed, otherwise it is assumed open.

    One major problem with this technique is that, when a firewall blocks outgoing ICMP Port Unreachable messages, the port will appear open. These false-positives are hard to distinguish from real open ports.

    29 janvier 2016 à 14:44:48 UTC+1 - permalink - archive.org - https://nmap.org/bennieston-tutorial/
    icmp scan security udp
Links per page: 20 50 100
◄Older
page 1 / 3
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Help/documentation