blacklist   1473

« earlier    

Free Blacklist Monitoring | Blacklist Check - HetrixTools
The simple way to blacklist check and monitor your IPs or Domains and notice if any of them get blacklisted, so you can immediately take action to find the cause and start the delisting procedures, before it gets to affect you or your clients.

email  security  server  monitoring  devops  dns  blacklist  spam  uptime  service   
25 days ago by michaelfox
[no title]
Free blacklist monitoring and blacklist checks for your IP addresses and domains. Get alerts when you get blacklisted so you can take immediate action.

Free blacklist monitoring and blacklist checks for your IP addresses and domains. Get alerts when you get blacklisted so you can take immediate action.

email  security  server  monitoring  devops  dns  blacklist  spam 
25 days ago by michaelfox
Reputation Center - Cisco Talos
Talos Reputation Center provides global network security threat data in real time to help you identify and fight the leading security threats.
ip  security  spam  reputation  email  blacklist  deliverability 
27 days ago by damli
ReputationAuthority | WatchGuard Technologies
WatchGuard gives you powerful firewall and VPN appliances for small and medium-size enterprises.
ip  security  spam  reputation  email  blacklist  deliverability 
27 days ago by damli
Mails en spam directement. SPF/DKIM/spf2/dmarc - Microsoft Community
Bonjour, Depuis notre serveur de mail, les mails arrivent directement en spam sur hotmail (mais pas sur orange ou free).Configuration DNS: phpmailer._domainkey IN TXT "v=DKIM1; k=rsa;
microsoft  hotmail  blacklist  spam  delivery  header 
4 weeks ago by damli
cry/nbp: NIST Bad Passwords - JavaScript library for detecting common passwords.
password blacklist javascript library, though for additional blacklists, maybe use openwall dictionaries?
NIST  bad  password  blacklist  javascript  library  dictionary 
5 weeks ago by asteroza
About Attributes — Chef Docs
An attribute is a specific detail about a node, such as an IP address, a host name, a list of loaded kernel modules, the version(s) of available programming languages that are available, and so on. An attribute may be unique to a specific node or it can be identical across every node in the organization. Attributes are most commonly set from a cookbook, by using knife, or are retrieved by Ohai from each node prior to every chef-client run. All attributes are indexed for search on the Chef server.

A recipe is the most fundamental configuration element within the organization. A recipe:

Is authored using Ruby, which is a programming language designed to read and behave in a predictable manner
Is mostly a collection of resources, defined using patterns (resource names, attribute-value pairs, and actions); helper code is added around this using Ruby, when needed
Must define everything that is required to configure part of a system
Must be stored in a cookbook
May be included in a recipe
May use the results of a search query and read the contents of a data bag (including an encrypted data bag)
May have a dependency on one (or more) recipes
May tag a node to facilitate the creation of arbitrary groupings
Must be added to a run-list before it can be used by the chef-client
Is always executed in the same order as listed in a run-list

An environment is a way to map an organization’s real-life workflow to what can be configured and managed when using Chef server. Every organization begins with a single environment called the _default environment, which cannot be modified (or deleted). Additional environments can be created to reflect each organization’s patterns and workflow. For example, creating production, staging, testing, and development environments. Generally, an environment is also associated with one (or more) cookbook versions.
chef  configuration  management  attribute  attributes  default  force_default  override  force_override  automatic  ohai  node  nodes  recipe  recipes  cookbook  cookbooks  default_unless  set_unless  override_unless  precedence  blacklist  whitelist 
10 weeks ago by dza

« earlier    

related tags

1stamend  2015  account  adblocker  analysis  anti-webminer  antimalware  antispam  area  arma3  assurance  attribute  attributes  auth_gss  authentication  automatic  bad  bann  beall  blacklisted  blacklisting  blacklists  bladwijzerbalk  block  blocker  blockers  blocking  blocklist  blog  botnet  breaking  bruteforce  bt  buddy  building  call  calls  certificate  check  chef  communications  configuration  consumer-reports  consumerreports  cookbook  cookbooks  cracking  cybersecurity  dallas  database  dataset  default  default_unless  delicious  delist  deliverability  delivery  detection  development  devices  devops  df  dictionary  digitalocean  digittone  disconnect  disd  dns  dnsbl  dogs  domain  domainfactory  email  emailblacklist  encoding  enemies-list  engine  evaluation  exile  explanation  extremism  extremists  file  filmmaking  filter  filtering  filters  firewall  force_default  force_override  forum  gadgets  gay  geeky  geoip  geïmporteerd  google  greylist  guide  hackedsite  hacking  header  hellsite  homeland  host  hotmail  howto  hqtelecom  imei  information  infosec  injection  input  internet  ip  ipaddress  javascript  jefferson  jinja2  journals  jwt  kernel  kids  korea  leftist  library  list  littlesnitch  login  lookup  mac  mail  mailfilter  mailserver  malware  management  microsoft  module  monitoring  music  mx  naming  network  nfs  nist  node  nodes  nomorobo  nuisance  nyc  office365  ohai  osx  outlook  override  override_unless  password  pfsense  phone-calls  plugin  politics  postfix  powershell  precedence  privacy  products  profanity  programming  question  rbl  recipe  recipes  reference  reporting  reputation  reserved  restricted  review  reviews  revoke  rfkill  robo-call  robo-calls  robocall  robocalls  screenplays  screenwriting  scripting  search  security  sentry  server  service  services  set_unless  smtp  software  spam  sql  squid  ssh  ssl  strings  sysadmin  tagging  technology  telephone-calls  telephone  telephones  telephony  terrorists  testing  tolearn  tool  tools  tor  toread  toronto  toshare  tounderstand  trump  tumblr  tutorial  twitter  ubuntu  unite  unknown  updates  uptime  url  username  utf-8  vulnerabilities  web  webproxy  what  white  whitelist  whitelisting  wifi  windows  wireless  wordpress  words  zeus   

Copy this bookmark: