happycattech.com
Baja Broadband Actively Blocking Domains? | happycattech.com
http://www.happycattech.com/story/baja-broadband-actively-blocking-domains
Satisfied customers are the Cat's Meow! Baja Broadband Actively Blocking Domains? Submitted by alreaud on Sun, 05/17/2015 - 18:55. About a month ago I started having trouble with my Kali installation. It no longer found the repositories. I wound up having to use the TOR Browser Bundle. To perform updates. This appeared strange, but I thought well, maybe there is a problem with the Kali repositories. To give an example…. A page related to openvas. Is this behavior legal on the part of Baja Broadband?
cis.hr
Ispitivanje ranjivosti računala | Ispitivanje ranjivosti poslužitelja
http://www.cis.hr/sigurosni-alati/ispitivanje-ranjivosti-racunala.html
Okruženje za proučavanje malicioznih programa. Ispitivanje sigurnosti bežičnih mreža. Ispitivanje ranjivosti web aplikacija. Filtriraranje web prometa - proxy. Zaštita mreže - vatrozid. Ponedjeljak,Kolovoz 22,2016. Što je potrebno vašoj organizaciji kako bi imala veći stupanj informacijske sigurnosti? Odnosi se na ograničavanje pristupa informacijama pojedincima koji ne posjeduju potrebne ovlasti - npr. napad na lozinku sirovom snagom (. Man in the middle attack. Jer omogućuju mjesto napada na sustav.
bigredbox.co.uk
alphajuliet – bigredbox
http://bigredbox.co.uk/author/alphajuliet
No boxes, not big and not red…. Which Superhero Is Best? June 13, 2016. It’s kind of impossible to say which superhero is the best, since there’s just too many of them to count, but a seven-year study at the University of Leicester. Purports to help shine a light on the debate. Black Bolt, the leader of the Inhumans, also gets a special mention as being the single most destructive superhero due to the potential for his hypersonic voice to level cities. Of course, the research is. I encourage them to be a...
procyonlabs.com
Procyon Labs - Software
http://www.procyonlabs.com/software/index.php
PLABS, Corporate and Group Efforts. Astraeus is intended to provide complete control and analysis for a Snort/Suricata IDS/IPS environment. BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system. Note: No longer supported. Splunk Add-on for Netflow. Splunk App for Enterprise Security. The Splunk App for Enterprise Secur...
intevation.org
Intevation: News
http://www.intevation.org/news.en.html
Jump to search and secondary content. If you would like to link to a news item, please use the corresponding URL in the archive. If you would like to receive news messages via email, as they are released, please subscribe here. Wald - develop FS.
intevation.net
Intevation: Profile
http://www.intevation.net/profile.en.html
Jump to search and secondary content. We create sustainable IT. Our solutions are independent of vendors and we always consider security and quality. It is important to be in touch with the customer and users. Thus we prefer working transparently with an agile approach to software development. This helps us to create a good user experience within the given budget. Intevation keeps good relations with many Free Software initiatives We are a member of the Open Source Business Alliance (OBSA). Once a year w...
giungato.it
ITSecurity - MioWiki
http://www.giungato.it/index.php/ITSecurity
IT security and networking sites. Other open source tools. 1 CISSP - Certified Information Services Security Professional. 2 OSSTMM - OPSA. 2 The Hacker's RFC. 3 Cyber Security Awareness Month 2008 - Summary and Links. 5 Security RFP cheat sheet. 0 IT Security tools. 1 Helix - a live Linux distribution oriented to Computer Forensics. 6 OpenVAS - a Nessus fork. 10 Darik's Boot And Nuke - Hard drive disk wipe. 12 UCSniff VoIP sniffer. 14 The Metasploit Framework. 15 Tor - The Onion Router. My library/La mi...
xerocrypt.wordpress.com
Pandora’s Box | The Krypt
https://xerocrypt.wordpress.com/pandoras-box
Welcome to the goodies room! The following are the security and forensic tools I found useful over the years. I installed them on a Linux system, but some are available for Microsoft Windows. Perhaps the best known set of tools for breaking wireless gateway keys, although it’s not effective on a netbook with limited hardware resources. Definitely a good idea to install this if you’re doing any static analysis or shellcoding. Bokken is the GUI for the Radare reverse engineering framework. A pretty good vu...