188 private links
Une odalisque était une esclave vierge, qui pouvait monter jusqu'au statut de concubine ou de femme dans les sérails ottomans, mais dont la plupart étaient au service du harem du sultan. Le mot vient du turc odalık, qui signifie « femme de chambre », d'oda, « chambre ». En littérature, le terme désigne une femme de harem.
An odalisque was a chambermaid or a female attendant in a Turkish seraglio, particularly the court ladies in the household of the Ottoman sultan.
Adhering to a set of 10 verifiable coding rules can make the analysis of critical software components more reliable.
Gerard J. Holzmann
NASA/JPL Laboratory for Reliable Software
Search through 1,530,557 icons or browse 35,996 icon sets.
A danbooru-style image board, designed to be easier to install, run, and extend.
Requires a standard LAMP stack as provided by any normal web host. It can also use PostgreSQL as a database, which is recommended for high-load sites.
This is probably my most popular project, with a team of 10 coders, hundreds of installations, and thousands of users online at once.
Official website: http://code.shishnet.org/shimmie2/
Click on a link below to visit the page for each product version.
Below is a list of known issues in RSA Security Analytics 10.6, including those listed in the Release Notes. Please click on the links to go directly to the articles.
The following is an alphabetical list of supported event sources that are available in RSA NetWitness Logs.
UwAmp
Serveur Wamp Apache MySQL PHP et SQLite
Web property of Monterey Technology Group, Inc. devoted to spreading knowledge and understanding of Windows Security, IT Audit and Compliance with exclusive content from Randy Franklin Smith.
NWmodule.py
nwmodule.py is a python module I wrote that interfaces with the Netwitness REST API. All Maltego transforms are dependent on this module and functions within it. It must ne within the directory that contains the Maltego transforms.
Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.
Welcome to the Central Intelligence Agency's Freedom of Information Act Electronic Reading Room.
Do UFOs fascinate you? Are you a history buff who wants to learn more about the Bay of Pigs, Vietnam or the A-12 Oxcart? Have stories about spies always fascinated you? You can find information about all of these topics and more in the Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Electronic Reading Room.
La sécurité informatique est l'ensemble des moyens techniques, organisationnels, juridiques et humains nécessaires et mis en place pour conserver, rétablir, et garantir la sécurité des systèmes informatiques. Elle est intrinsèquement liée à la sécurité de l'information et des systèmes d'information.
This space contains information about the RSA Content program for the RSA NetWitness Suite. It contains information on Rules, Reports, procedures, and meta related to content that is available on Live. The information in this space applies to all versions of Security Analytics (unless noted otherwise).
RSA NetWitness ESA Correlation Rules / Alerts available by default on the plateform
Puppet 4.9 consists of:
A puppet-agent “All-in-One” package that installs Puppet, Ruby, Facter, Hiera, and supporting code.
A puppetserver package that installs Puppet Server.
A puppetdb package that installs PuppetDB.RSA Content for the RSA NetWitness Suite: Documents; Procedures; Guides.
For RSA Security Analytics 10.6.2
RSA Content for the RSA NetWitness Suite: Documents; Procedures; Guides
A simple PHP library to extract information about web pages, like youtube videos, twitter statuses or blog articles.
Ransomware Tracker tracks and monitors the status of domain names, IP addresses and URLs that are associated with Ransomware, such as Botnet C&C servers, distribution sites and payment sites.
Ransomware Tracker provides a short guideline for both home users and enterprises on how to avoid becoming a victim of Ransomware.
Ransomware Tracker offers various blocklists. These blocklists allows enterprises to block malicious traffic towards known Ransomware infrastructure at the network edge, e.g. by blocking them on the corporate firewall, web proxy or in the local DNS server.