security   498025

« earlier    

How To Determine If You Need A Fence
A fence could be exactly what your property needs. If you are unsure if your property needs a fence, consider the following.
curb-appeal  fence  security 
15 hours ago by Adventure_Web
LockRattler 4.1b1 tells you more, and can install updates for you – The Eclectic Light Company
Now tells you of the latest installed updates, macOS and security updates, and lets you force and install any outstanding updates.
osx  security  software 
17 hours ago by mandarine
How to Lock Down Your Privacy on Social Media | SpiderOak
Hopefully by this point you’re not accepting friend requests from random strangers, but you can take plenty more steps to make sure you maintain as much privacy as possible. Simply adjusting a few settings can go a long way to securing your information, but you may want to go as far as exploring alternate social media sites.
FB  security  !publish  !share 
17 hours ago by zephyr777
The Human Element of Your Disaster Recovery Plan
One of the most important things to keep in mind when creating your disaster recovery plan is to remember that humans are not infallible.
network  security  disaster  recovery  plan  accountability 
20 hours ago by Adventure_Web
Escape Sequences | Git Diff & Git Log | TwistlockLabs
This post discusses how escape sequences are not something to treat lightheartedly and how easy it is to hide content from Git
git  security 
20 hours ago by geetarista
Tracking People Without GPS - Schneier on Security
Twenty questions gets you a long way… so what could you learn if you joined <20 pieces of data together…
security  privacy  locationdata  location  mosaic 
21 hours ago by psychemedia

« earlier    

related tags

!publish  !share  -  0000  0day  10.13  1861  2fa  accountability  ad  adblock  adguard  advice  ai  analysis  ansible  apple  applocker  argon2  atlanticocean  authentication  bcrypt  bestpractices  binary  ble  blockchain  blocking  bluetooth  botnet  browsers  bug  bugs  cables  capabilities  capability  certificate  certificates  chat  cheatsheet  checklist  chrome  circle  cli  collaboration  college  communication  crypto  cryptocurrency  cryptography  culture  curb-appeal  cybersecurity  ddos  decompiler  defense  dev  development  devices  devops  dfir  disassembler  disaster  disney  distributed  dns  domain  dongle  dos  dotfiles  dystopia  e.commerce  ecc  economics  education  electronics  ellipticcurve  email  encoding  encrypt  encrypted  encryption  engineering  enumeration  espionage  event  example  expert-system  extended-validation  facebook  fail  fastmail  fb  fence  fingerprinting  firearms  firewall  fuzz  fuzztesting  git  gmail  golang  google  government  gpg  guide  hack  hacking  hardware  hash  hashicorp  help  history  homepage  howto  http  https  hunting  hyper-v  identity  ids  ifttt  in  incident  infosec  instagram  interesting  internet  ios  iot  ir  isdp  isp  issue  krebs  lasc  latest  law  legal  local  location  locationdata  log  logging  longread  mac  macos  mail  math  maths  media  mfa  military  minecraft  monero  monitoirng  monitoring  mosaic  mqtt  network-security  network  networking  news  nmap  online  openload  opensource  osx  p2p  password  passwords  payments  performance  permissions  philosophy  phishing  php  pki  plan  players  podcast  politics  powershell  privacy  programming  proximity  read-later  recovery  redirect  reference  research  response  reverse  robots  root  router  rsa  russia  russian  safety  scam  scanner  scrypt  sensor  server  service  setup  shamirs-secret  shared.secrets  shell  slider  slpe  snort  software  softwaredesign  ssh  ssl  stackexchange  sysadmin  sysinternals  sysmon  tcpip  threat  threats  tips  tld  tls  tokens  tools  tracking  transit  tutorial  u2f  unread  urbanism  vault  versioncontrol  vocabulary  warstory  web  webdev  weffles  wifi  win  windows  x509  yubikey  | 

Copy this bookmark: