Security   464926

« earlier    

Blockchain Demo
One of the best explanations of the blockchain
demo  security  video  bitcoin  blockchain  howto 
7 hours ago by ivar
How to build your own VPN if you’re (rightfully) wary of commercial options | Ars Technica
With a Congress that has demonstrated its lack of interest in protecting you from your ISP, and ISPs that have repeatedly demonstrated a "whatever-we-can-get-away-with" attitude toward customers' data privacy and integrity, it may be time to look into how to get your data out from under your ISP's prying eyes and grubby fingers intact. To do that, you'll need a VPN.
privacy  network  vpn  security  sysadmin 
9 hours ago by jefframnani
Coding Safe Themes with Built-In WordPress Functions — SitePoint
Maria Antonietta Perna discusses writing safe code in WordPress themes and shows some built-in functions you can plug into your code for added security.
wordpress  themes  web_development  security 
9 hours ago by kger
Protecting Your Digital Life in 9 Easy Steps
1. Download Signal, or Start Using WhatsApp to send text messages.
2. Be wary of clicking on unfamiliar links or documents and apply software updates.
3. Protect your computer’s hard drive with FileVault or BitLocker — and back up your data to an online backup service, external hard drive, or both.
4. The way you handle your passwords is probably wrong and bad.
5. Protect your email and other accounts with two-factor authentication.
6. Use a browser plug-in called HTTPS Everywhere.
7. Invest in a Virtual Private Network, or VPN.
8. Remember that incognito mode isn’t always private.
9. Do sensitive searches in DuckDuckGo.

From The New York Times
security 
11 hours ago by sisterical
Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives
This repository contains materials for a hands-on training Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives

A variety of attacks targeting system firmware have been discussed publicly, drawing attention to the pre-boot and firmware components of the platform such as BIOS and SMM, OS loaders and secure booting. This training will detail and organize objectives, attack vectors, vulnerabilities and exploits against various types of system firmware such as legacy BIOS, SMI handlers and UEFI based firmware, mitigations as well as tools and methods available to analyze security of such firmware components. It will also detail protections available in hardware and in firmware such as Secure Boot implemented by modern operating systems against bootkits.

The training includes theoretical material describing a structured approach to system firmware security analysis and mitigations as well as many hands-on exercises to test system firmware for vulnerabilities. After the training you should have basic understanding of platform hardware components and various types of system firmware, security objectives and attacks against system firmware, mitigations available in hardware and firmware. You should be able to apply this knowledge in practice to identify vulnerabilities in BIOS and perform forensic analysis of the firmware.
hardware  security  profdev 
11 hours ago by Chirael
Get your loved ones off Facebook
Scathing details of what Facebook does in collecting data on you and how they use it. In short, they try to gather as much info as they can (ala RapLeaf) and they use it for their own gain.
security  business 
13 hours ago by adamtait

« earlier    

related tags

analysis  anonymous  anti-malware  apache  app  architecture  arstechnica  assembly  authentication  authoritarianism  aws  aws_security  bitcoin  blockchain  browser  business  certificate  checklist  civilliberties  common  configuration  contracts  credentials  crypto  cyber  debugging  demo  development  digital  diy  downloads  email  encrypted  express  flows  framework  freeware  gadget  guide  hacking  hadoop  hardware  health  historu  homerepair  hortonworks  howto  identity  imagemagick  internet  iot  issues  it  kerberos  kids  learning  linux  machine-learning  malware  medical  medtech  microsoft  mobile  mydata  nas  netsec  network  networking  news  nginx  novara  oauth  okf  opensource  openvpn  p2p  passwords  pattern  penetration_testing  performance  policing  politics  privacy  profdev  programming  protocol  proxies  python  r  reference  s/mime  safety  security  service  setup  signature  spam  ssh  ssl  support  surveillance  sysadmin  t  tcpip  tech  technology  terraform  terrorism  themes  threat  tip  tips  todo  tool  tools  travel  tricks  troubleshooting  tutorial  uefi  uk  unix  userresearch  utility  ux  vault  video  videos  virtualnetwork  visualization  vpn  waronterror  web  web_development  webdesign  weekly  windows  wordpress  yahoo!  youtube 

Copy this bookmark:



description:


tags: