Hacker   11624

« earlier    

Cisco's Talos Intelligence Group Blog: CCleanup: A Vast Number of Machines at Risk
Aaargh. Avast seems to have had a build server hacked in order to implant something nasty into production software
malware  hacker  avast  ontrustingtrust 
yesterday by yorksranter
Using GraphQL? Why Facebook Now Owns You 🐲
Compelling argument for why GraphQL is not worth supporting because:

> Facebook's GraphQL spec doesn't grant a patent license. Therefore, for reasons as set forth below, most GraphQL users infringe Facebook's patents.
hacker  reference  patent  graphql  licensing  news  facebook  patents 
2 days ago by jefftriplett
15 Essential Open Source Security Tools | HackerTarget.com
1. Nmap - map your network and ports with the number one port scanning tool. Nmap now features powerful NSE scripts that can detect vulnerabilities, misconfiguration and security related information around network services. After you have nmap installed be sure to look at the features of the included ncat - its netcat on steroids.

2. OpenVAS - open source vulnerability scanning suite that grew from a fork of the Nessus engine when it went commercial. Manage all aspects of a security vulnerability management system from web based dashboards. For a fast and easy external scan with OpenVAS try our online OpenVAS scanner.

3. OSSEC - host based intrusion detection system or HIDS, easy to setup and configure. OSSEC has far reaching benefits for both security and operations staff.

4. Security Onion - a network security monitoring distribution that can replace expensive commercial grey boxes with blinking lights. Security Onion is easy to setup and configure. With minimal effort you will start to detect security related events on your network. Detect everything from brute force scanning kids to those nasty APT's.

5. Metasploit Framework - test all aspects of your security with an offensive focus. Primarily a penetration testing tool, Metasploit has modules that not only include exploits but also scanning and auditing.
hacking  hacker  nmap  pentesting  security  best  tools 
4 days ago by hellsten
Dear Amazon, We Picked Your New Headquarters for You - The New York Times
Let’s skip the nationwide bidding war and cut right to the winner.
amazon  pocket  ifttt  denver  feedly  Hacker  News  Stuff 
6 days ago by xer0x

« earlier    

related tags

(video  101  2017-09-03  2017-09-05  2017-09-07  a/b  accelerometer  account  activity  activitystreams  ads  advertising  advice  africa  aggregator  ai  amazon  angelfire  anonymity  apac  api  app  application  arc  architecture  archiv  article  au  audio  audioapi  avast  aws  backup  ban  banking  behörde  best  bestpractices  bicoin  bicycles  bigdata  bikes  biometrics  bitcoin  bizplan  blockchain  blog  bond/q  book  books  browser  btc  building  burningman  business  businessplan  camera  canon_au  capitalism  career  cheating  cheats  china  church  cia  city  civichacking  civilian!q  clojure  cloudfare  code  column  conservation  construction  container  coreml  counter-strike  counter-strike:  cpu  criminals  crofflr  crossword  crosswords  crypto  cryptocurrency  cryptography  cs  cs:go  cuda  culture  currency  daily  data  datascience  dca  delivery  denver  design  dev  developer  development  didway  digital  distributed  diy  dnd  dns  docker  drone  drones  drugs  ebook  economics  ego  elections  electricity  electronics  elm  email  encryption  energy  engineering  established  exokernel  explo_electronics_project  facebook  fact  facts  fail  fandom:jamesbond  fandom:roosterteeth  feedly  female  feminism  finance  firefox  flusha  fnatic  food-for-thought  food  forensics  forum  founder  fraud  friends  game)  game  games  gavin/ryan  ge  geek  genetics  getpocket  gif  github  global  gmail  golang  google  graphql  graphtheory  green-building-advisor  green  grid  growth  gta_au  guideline  gyroscope  hack  hacker  hackernews  hacking  hardware  headphone  healthcare  hijacking?  history  hosted  howto  hsbc  hw  id  ideas  identity  ifttt  indesign  indie  info  information  infosec  infrastructure  inspiration  instapaper  intel  interestin  interesting  internet  interview  investing  ios  iphone  is  it  jack  japan  java  javascript  kafka  karl  keylogger  killer  kj  kraken  kubernetes  kvm  later  latex  law  layout  let's_play_au  lexicon:  licensing  links  list  longread  longreads  lua  machine-learning  machine_learning  machinelearning  mainstream  malware  manners  manufacturing  maps  marketing  medical  megachurch  metadaten  microkernel  ml  mobile  model  moments  mongodb  monty  mozilla_developer_network  mozilla_firefox  mozilla_firefox_development  mozilla_firefox_development_tools  mp3  music  mysql  nautilus  nerd  network  networking  new-york-times  news  newsletter  nginx  nigeria  nmap  nsa  nucl  nytimes  offensive  ontrustingtrust  opensource  patent  patents  pdf  pentesting  performance  pivot  plane_crash  play  pocket  portland  povery  power  profiling  programming  projects  property  psychology  python  r  ramsey  rating:nc-17  rating:pg-13  react  read  reddit  reference  repository  research  resources  rude  russia  saas  sales  savetheplanet  sciencefair  secret_relationship  security  shapiro  shenzhen  side  similar  slow_build  snowden  software  solar  spooks  spyware  stream  stuff  style  surveillance  suspension  sysadmin  technology  teen  test  testing  tools  toread  trading  transformation  trees  trojaner  trump  tutorial  typesetting  typography  ubuer  unikernel  unix  ux  vac  vacation  verschlüsselung  virtualisation  vogue  wealth  web  webaudio  webserver  weird  what  whitehat  wilfried  wired  wordpress  words:12000-20000  words:80000andup  wow  wtf  zitis 

Copy this bookmark:



description:


tags: