188 private links
Biographie
Blog & divers
Photos
Musique
Vidéos
Ami-e-s
Ceci est la page par défaut de ce serveur web. Le serveur web fonctionne et du contenu a été ajouté.
blog
shaarli
autoblogs
my repositories
zerobin
mycryptochat
media
Vous pouvez aussi visiter mon "site étudiant".
The Microsoft Security Response Center (MSRC) investigates all reports of security vulnerabilities affecting Microsoft products and services, and provides the information here as part of the ongoing effort to help you manage security risks and help keep your systems protected.
Depuis presque 15 ans, Abandonware France propose l'une des plus grosses bases de données en Francais concernant les anciens jeux PC de 1980 à 1999.
L'équipe se décarcasse pour proposer le plus de nouveaux anciens jeux possibles, mais cela n'est pas toujours facile. D'où ce nouvel appel à l'aide.
Abandonware France proposera encore de nombreux jeux, manuels, vidéos... mais plus on est de fous, plus il y a de fiches et de jeux à télécharger.
The repository mainly contains Windows and Apple betas. These are the most popular files and are enjoyed by most of our members on the forum. We also have a games repository which has a huge selection of older and more modern game betas. We like to widen our scope a little bit too, so our repository stocks old abandonware classics from various consoles and computers from many years ago.
This schematic map shows a simplification of the world’s network of submarine fibre-optic cables.
This video show how to developp a complete application within Qradar using the new Qradar Application Editor
Fake Windows Update Screens
Prank your friends and colleagues with fake update screens!
Press F11 to go fullscreen
Press ENTER to cause a BSOD
Suricata is a free and open source, mature, fast and robust network threat detection engine. The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing.
Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. Suricata’s fast paced community driven development focuses on security, usability and efficiency.
The Suricata project and code is owned and supported by the Open Information Security Foundation (OISF), a non-profit foundation committed to ensuring Suricata’s development and sustained success as an open source project.
In most cryptographic functions, the key length is an important security parameter. Both academic and private organizations provide recommendations and mathematical formulas to approximate the minimum key size requirement for security. Despite the availability of these publications, choosing an appropriate key size to protect your system from attacks remains a headache as you need to read and understand all these papers.
This web site implements mathematical formulas and summarizes reports from well-known organizations allowing you to quickly evaluate the minimum security requirements for your system. You can also easily compare all these techniques and find the appropriate key length for your desired level of protection. The lengths provided here are designed to resist mathematic attacks; they do not take algorithmic attacks, hardware flaws, etc. into account.
The OpenC2 Forum defines a language at a level of abstraction that will enable unambiguous command and control of cyber defense technologies. OpenC2 is broad enough to provide flexibility in the implementations of devices and accommodate future products and will have the precision necessary to achieve the desired effect.
Here are some free harmonica tabs for beginning, intermediate and advanced harmonica players.
Harmonica tabs are easier to follow if the audio can be heard while watching the tab. The free harmonica tabs below use this method, the audio is provided with online players.
Computoser uses an algorithm to generate music. Each generated track is a unique combination of tones, rhythm and instruments.
The algorithm is currently experimental - it may generate both good and bad pieces. Feel free to mark the ones you like and the ones you dislike, so that I know how to improve the algorithm.
The performance may sound a bit artificial - that's because it's synthesized music - a computer can hardly have the performance of a human musician.
This webpage is a free malware analysis service powered by Payload Security that detects and analyzes unknown threats using a unique Hybrid Analysis technology.
This free malware analysis service is running VxStream Sandbox v6.70 in the backend. Supporting PE, Office, PDF, APK files and more (e.g. EML). Maximum upload size is 100 MB.
THE TECHNOLOGIES LISTED BELOW were developed within the National Security Agency (NSA) and are now available to the public via Open Source Software (OSS). The NSA Technology Transfer Program (TTP) works with agency innovators who wish to use this collaborative model for transferring their technology to the commercial marketplace. OSS invites cooperative development of technology, encouraging broad use and adoption. The public benefits by adopting, enhancing, adapting, or commercializing the software. The government benefits from the open source community’s enhancements to the technology.
This paper focuses on using the built-in tools already available in the Microsoft Windows operating system (OS). Central event log collection requires a Windows Server operating system version 2003 R2 or above. Many commercially available tools exist for central event log collection. Using a Windows Server 2008 R2 or above server version is recommended. There are no additional licensing costs for using the event log collection feature. The cost of using this feature is based on the amount of additional storage hardware needed to support the amount of log data collected. This factor is dependent on the number of workstations within the local log collection network.
You can record and store security audit events for Windows 10 and Windows Server 2016 to track key system and network activities, monitor potentially harmful behaviors, and mitigate risks. You control the amount of data you collect by controlling the categories of security events you audit, for example, changes to user account and resource permissions, failed attempts to access resources, and attempts to modify system files. The reference in this download can help you decide what to monitor and how to interpret the data you collect.
The URL Builder tool lets you generate URLs ready to use for Tracking Campaigns in Piwik. See the documentation about Campaign Tracking for more information.
Fill in the information in the form below and click the Generate URL button.
GOOGLE BIGQUERY
Entrepôt de données rapide, économique et intégralement géré, destiné à l'analyse de données à grande échelle dans les entreprises
The Zero Day Initiative (ZDI), founded by TippingPoint, is a program for rewarding security researchers for responsibly disclosing vulnerabilities. Depending on who you are, here are a few links to get you started:
Researchers: Learn how we pay for your vulnerability discoveries, register for the ZDI or login.
Vendors: Read our disclosure policy or join our security partner program
Press, Curiosity Seeker: Learn more about ZDI or read answers to some frequently asked questions
Please contact us at zdi [at] trendmicro [dot] com with any questions or queries. For sensitive e-mail communications, please use our PGP key.