Shaare your links...
3394 links
L!NKS Retour au blog Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 159 / 170
Newer►
  • Security policies must address legal implications of BYOD | TechRepublic
    En parallèle du dernier MISC : un article sur la tendance Bring Your Own Device et ses implications en matière de sécurité des systèmes.
    permalink -
    - http://www.techrepublic.com/blog/security/security-policies-must-address-legal-implications-of-byod/9280
    BYOD sécurité
  • hackingciphers.pdf
    permalink -
    - http://inventwithpython.com/hackingciphers.pdf
    book crypt python
  • Code Like a Pythonista: Idiomatic Python
    le ZEN python :

    Beautiful is better than ugly.
    Explicit is better than implicit.
    Simple is better than complex.
    Complex is better than complicated.
    Flat is better than nested.
    Sparse is better than dense.
    Readability counts.
    Special cases aren't special enough to break the rules.
    Although practicality beats purity.
    Errors should never pass silently.
    Unless explicitly silenced.
    permalink -
    - http://python.net/~goodger/projects/pycon/2007/idiomatic/handout.html
    python
  • Hacking the <a> tag in 100 characters
    permalink -
    - http://bilaw.al/2013/03/17/hacking-the-a-tag-in-100-characters.html
    hacking
  • Panoptic
    permalink -
    - http://websec.ca/blog/view/panoptic
    hacking LFI
  • DotDotPwn - The Directory Traversal Fuzzer
    permalink -
    - http://dotdotpwn.blogspot.fr/
    directoryTraversal fuzzing hacking
  • DropSmack: Using Dropbox to steal files and deliver malware | TechRepublic
    Utiliser le canal de synchronisation de Dropbox (ou tout autre outil de synchro dans le nuage) pour prendre le contrôle d'un PC lorsqu'il est dans la zone "sécurisée" de l'entreprise.
    permalink -
    - http://www.techrepublic.com/blog/security/dropsmack-using-dropbox-to-steal-files-and-deliver-malware/9332
    hacking sécurité
  • IL Y A UN LOUP – Dans les écoles américaines les armes sont autorisées, mais pas « Le Petit Chaperon rouge » | Big Browser
    via sebsauvage : http://sebsauvage.net/links/?CokoXw

    (:-(
    permalink -
    - http://bigbrowser.blog.lemonde.fr/2013/04/19/il-y-a-un-loup-dans-les-ecoles-americaines-les-armes-sont-autorisees-mais-pas-le-petit-chaperon-rouge/
    grrrr
  • Security Operations by Visible Risk - Visible Risk - Enterprise Defensibility through Visibility, Intelligence, Content and Advanced Analytics
    permalink -
    - http://visiblerisk.com/blog/
    blog sécurité
  • Wiki Pages - corkami - reverse engineering & visual documentations - Google Project Hosting
    permalink -
    - http://code.google.com/p/corkami/w/list
    reverse
  • Novlangue, de mieux en mieux - TDC
    videotranquillité !

    mwarf !!!!
    permalink -
    - http://hoper.dnsalias.net/tdc/index.php?post/2013/04/16/Novlangue
    langueFrançaise
  • Dilandau - Télécharger de la musique MP3 gratuitement
    permalink -
    - http://fr.dilandau.eu/
    music
  • Download & Streaming : Software Archive : Internet Archive
    après les archives de sites web, archive.org archive aussi les logiciels !
    permalink -
    - http://archive.org/details/software
    web
  • Intercepter Sniffer 0.9.7 ≈ Packet Storm
    Intercepter is a sniffer that offers various capabilities including sniffing for password hashes related to ICQ/IRC/AIM/FTP/IMAP/POP3/SMTP/LDAP/BNC/SOCKS/HTTP/WWW/NNTP/CVS/TELNET/MRA/DC++/VNC/MYSQL and ORACLE. It also sniffs ICQ/AIM/JABBER/YAHOO/MSN/GADU-GADU/IRC and MRA protocols. It has a built-in arp poisoning module, can change MAC addresses of LAN adapters, and has various other interesting functionality.
       Changes: New versions provides the ability to sniff the login and password of the target user that connects to SSH server and intercepts the session data such as commands.
    permalink -
    - http://packetstormsecurity.com/files/121349/Intercepter-Sniffer-0.9.7.html
    hacking sniffer sécurité
  • MASTIFF | Free software downloads at SourceForge.net
    MASTIFF is a static analysis automation framework.

    Voir ici : http://secshoggoth.blogspot.fr/2013/02/mastiff-automated-static-analysis.html
    permalink -
    - http://sourceforge.net/projects/mastiff/
    sécurité
  • Matasano Security - Matasano Web Security Assessments for Enterprises
    permalink -
    - http://www.matasano.com/articles/crypto-challenges/
    challenges crypt
  • L'OTAN impose Microsoft et les backdoors de la NSA au ministère de la Défense ? | April
    Encore une affaire ! L'APRIL va avoir des réponses et j'espère que la lumière sera faite. La presse et les associations sont indispensables à la démocratie.
    permalink -
    - https://www.april.org/lotan-impose-microsoft-et-les-backdoors-de-la-nsa-au-ministere-de-la-defense
    actu CpasClair
  • Ca bouge dans le warez P2P et Streaming
    permalink -
    - https://zataz.com/news/22807/p2p_-warez_-films_-serie-tv_-streaming.html
    p2p
  • NIP Tip – Removing EXIF Data from Images & More | NoVA Infosec
    permalink -
    - https://www.novainfosec.com/2012/12/04/nip-tip-removing-exif-data-from-images-more/
    photo sécurité
  • L’évolution graphique des logos des grandes marques | {niKo[piK]}
    permalink -
    - http://www.nikopik.com/2013/04/levolution-graphique-des-logos-des-grandes-marques.html
    fun
Links per page: 20 50 100
◄Older
page 159 / 170
Newer►
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.