188 private links
If you need to convert files from one markup format into another, pandoc is your swiss-army knife.
If you are looking for official 10.6 documentation published by the RSA NetWitness Information Design and Development team -- user guides, release notes, installation instructions -- you are in the right place.
List all 10.6 user documentation (HTML and PDF): open the RSA Security Analytics 10.6 Table of Contents
List all documents in PDF format: click the PDFs category
List all guides in HTML format: click the Table of Contents category
List release documents--release notes, installation guides, and update instructions: click the Installation & Upgrade category
View translated 10.6 guides in PDF format: click French, Spanish, Japanese, or GermanThe Linux-HA project maintains a set of building blocks for high availability cluster systems, including a cluster messaging layer, a huge number of resource agents for a variety of applications, and a plumbing library and error reporting toolkit.
The following guides are the complete library for Security Analytics host and service configuration. Included are end-to-end initial setup and configuration instructions for each Security Analytics host and service, reference materials, and a database tuning guide. A suggested starting point is the Host and Service Getting Starting Guide.
The ESX Virtualization website is one of the Top Virtualization blogs with daily updates. Virtualization of Physical systems, disaster recovery scenarios with fast backups and recovery. Those are the daily challenges I’m working on…
I’m working with VMware and Microsoft virtualization technologies, and as an IT admin since more than 15 years. To be able to successfully implement, deploy, manage and troubleshoot VMware vSphere installations, you can’t take VCP for granted.
The Center for Internet Security (CIS) is a 501(c)(3) organization dedicated to enhancing the cybersecurity readiness and response among public and private sector entities. Utilizing its strong industry and government partnerships, CIS combats evolving cybersecurity challenges on a global scale and helps organizations adopt key best practices to achieve immediate and effective defenses against cyber attacks. CIS is home to the Multi-State Information Sharing and Analysis Center (MS-ISAC), CIS Security Benchmarks, and CIS Critical Security Controls.
This guides tells you:
What you need to apply STIG Hardening to Security Analytics.
How to configure STIG Hardening.
What the OpenSCAP report is and how you generate it.
What exceptions were discovered in 10.6 and why they occurred. We love technology and helping our customers — we get excited about computers and we love programming. We live to solve problems, code software, and make cool stuff happen. And, we love to share our creations with others.
WeeChat (Wee Enhanced Environment for Chat) is a free chat client, fast and light, designed for many operating systems.
This manual documents WeeChat chat client, it is part of WeeChat.
The vSphere CLI command set allows you to run common system administration commands against vSphere systems from an administration server of your choice.
ETSI, the European Telecommunications Standards Institute, produces globally-applicable standards for Information and Communications Technologies (ICT), including fixed, mobile, radio, converged, broadcast and Internet technologies. Our standards enable the technologies on which business and society rely.
Here we try to bring the knowledge of Network Professionals everywhere together in one place. Although the site is Cisco centric we welcome all type of topics from Juniper to SDN!
Cheatsheets and other resources for Network protocols, applications, syntaxes...
Discover original cyber security content provided by industry practioners, thought leaders, influencers, and innovative companies.
The complete FortiGate Cookbook is available for the following versions/formats:
5.4 (PDF | ePub | Mobi)
5.2 (PDF | ePub | Mobi)
5.0 (PDF)
4.3 (PDF)
Please note that the complete Cookbook is updated on an on-going basis and may not include the most recent recipes.
Imagine a world where governments compete for your citizenships. Bitcoin and Blockchain expert Toni Lane Casserly explains how this technology could anoint people over institutions.
Le « Hacking social » désigne les réflexions et les activités visant à identifier, comprendre, et détourner des structures sociales nuisibles aux individus et aux groupes. Par structures sociales, nous entendons tous les contextes et cadres où les rapports humains sont régis selon des mœurs ou des normes, qu’elles soient accidentelles (par exemple : la vie en famille) ou rationnelles (par exemple : le management dans les entreprises).
KraZhtest - Pony links - Fresh hacks - C'est le bordel