ebouchut + security   178

Display the dates (start, end) of a SSL Certificate
echo | openssl s_client -connect www.example.tld:443 2>/dev/null | openssl x509 -noout -dates
SSL  certificate  date  show  print  display  get  start  begin  end  expiration  CLI  openssl  dump  debug  security  expire 
12 weeks ago by ebouchut
Certificate Assessment | Qualys, Inc.
Next-generation cloud app for continuous monitoring, dynamic dashboarding and custom reporting of certificate issues and vulnerabilities
SSL  certificate  TLS  monitor  report  expiration  date  grade  issuer  name  vulnerability  security 
12 weeks ago by ebouchut
SSL certificate chain resolver | certificatechain.io
When installing an SSL certificate on a server you should install all intermediate certificates as well. Paste or upload your certificate to generate a .crt-file with all intermediate certificates concatenated.
SSL  certificate  intermediate  authority  crt  file  upload  online  tools  missing  outdated  generate  cert  server  security 
12 weeks ago by ebouchut
Windows Sandbox - Microsoft Tech Community - 301849
Windows Sandbox is a new lightweight desktop environment tailored for safely running applications in isolation. How many times have you - 301849
windows  virtualization  VM  sandbox  program  executable  run  security  isolate 
december 2018 by ebouchut
Open Source Password Management Solutions | Bitwarden
Bitwarden is a free and open source password management solution for individuals, teams, and business organizations.
password  manager  ios  app  application  browser  CLI  store  account  login  software  web  macos  mac  windows  iphone  opensource  security  password-manager  manage  tools  free 
november 2018 by ebouchut
FlowCrypt: Encrypt Gmail with PGP - Chrome Web Store
Simple end-to-end encryption to secure email and attachments on Google.
FlowCrypt adds a SECURE COMPOSE button to Gmail and Google Inbox. This way, you can send PGP encrypted emails when you choose so.
gmail  add-on  extension  plugin  PGP  crypt  email  client  cryptography  encrypt  security 
september 2018 by ebouchut
Download Root Certificates - GeoTrust
Download root certificates from GeoTrust, the second largest certificate authority. GeoTrust offers Get SSL certificates, identity validation, and document security.
SSL  certificate  geotrust  root  certification  authority  CA  download  list  security 
march 2018 by ebouchut
Why No Padlock?
"Are you pulling your hair out trying to find out why your secure page is not fully secure? Here's a simple tool that will tell you about any insecure items on your SSL page!"
SSL  certificate  check  verify  test  online  valid  security  secure  insecure  mixed  content  expire 
march 2018 by ebouchut
Chrome 63 forces .dev domains to HTTPS via preloaded HSTS
Chrome 63 (out since December 2017), will force all domains ending on .dev (and .foo) to be redirected to HTTPS via a preloaded HTTP Strict Transport Security (HSTS) header
chrome  dev  DNS  TLD  domain  redirect  https  issue  security  SSL  HSTS  bug 
december 2017 by ebouchut
YubiHSM 2 is here: Providing root of trust for servers and computing devices | Yubico
Every organization needs to protect their server environments and the cryptographic keys stored on those servers. Approximately 95% of all IT breaches happen when a user credential or server gets hacked. HSM hardware delivers advanced protection to prevent the theft of keys while at rest or in use. This protects against both logical attacks against the server, such as zero-day exploits or malware, and physical theft of a server or its hard drive. However, most companies have taken a software-bas...
yubico  yubikey  HSM  hardware  key  USB  module  security  CA  certificate  root  login  protection  active  directory  AD 
november 2017 by ebouchut
encryption - How to use OpenSSL to encrypt/decrypt files? - Stack Overflow
To Encrypt:
gpg --output encrypted.data --symmetric --cipher-algo AES256 un_encrypted.data

To Decrypt:
gpg --output un_encrypted.data --decrypt encrypted.data
encrypt  file  decrypt  cryptography  GPG  security  AES  cipher  openssl  blowfish  CBC 
september 2017 by ebouchut
Use openssl to encrypt /decrypt a file
openssl aes-256-cbc -salt -in secrets.txt -out secrets.txt.enc

openssl aes-256-cbc -d -in secrets.txt.enc -out secrets.txt.new
openssl  encypt  decrypt  file  security  encryption  cipher  cryptography  AES  from notes
september 2017 by ebouchut
Vault by HashiCorp
"Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more. "
security  API  key  store  strage  secure  lease  revocate  network  encryption  value  credential  certificate  access  control  password  secret  data  protect 
january 2017 by ebouchut
HTTP access control (CORS) Cross Origin Resource Sharing
"A resource makes a cross-origin HTTP request when it requests a resource from a different domain than the one which the first resource itself serves. For example, an HTML page served from http://domain-a.com makes an <img> src request for http://domain-b.com/image.jpg. Many pages on the web today load resources like CSS stylesheets, images and scripts from separate domains.

For security reasons, browsers restrict cross-origin HTTP requests initiated from within scripts. For example, XMLHttpRequest and Fetch follow the same-origin policy. So, a web application using XMLHttpRequest or Fetch could only make HTTP requests to its own domain. To improve web applications, developers asked browser vendors to allow cross-domain requests."
CORS  cross  origin  request  resource  share  HTTP  security  javascript  domain  multiple  SOP  same  policy  access  control 
december 2016 by ebouchut
Ruby on Rails - Strong Parameters
"With strong parameters, Action Controller parameters are forbidden to be used in Active Model mass assignments until they have been whitelisted. This means that you'll have to make a conscious decision about which attributes to allow for mass update. This is a better security practice to help prevent accidentally allowing users to update sensitive model attributes."
rails  rubyonrails  strong  parameter  forbidden  attributes  mass  assignment  update  permit  permitted  whitelist  authorize  controller  forbid  allow  post  put  security 
november 2016 by ebouchut
How To Install and Configure Naxsi on Ubuntu 14.04 | DigitalOcean
"Naxsi is a third party Nginx module which provides web application firewall features. It brings additional security to your web server and protects you from various web attacks such as XSS and SQL injections."
nginx  plugin  extension  add-on  module  security  firewall  web  server  XSS  SQL  injection  attack  protect 
november 2016 by ebouchut
Github U2F authentication with Yubikey | Yubico
GitHub Verified Commits

In addition, YubiKey 4 and YubiKey NEO can be used with GitHub’s “Verified” feature to protect the integrity of code stored in GitHub. GitHub commits are signed with GPG keys, which can be imported and stored on the YubiKey 4 or YubiKey NEO using these instructions. Verified check marks appear directly in the browser interface of GitHub, signaling to users that data has been provided by a trusted source."
github  key  yubico  yubikey  security  authentication  commit  U2F 
april 2016 by ebouchut
bkeepers/dotenv: Loads environment variables from `.env`.
"Shim to load environment variables from .env into ENV in development.

Storing configuration in the environment is one of the tenets of a twelve-factor app. Anything that is likely to change between deployment environments–such as resource handles for databases or credentials for external services–should be extracted from the code into environment variables.

But it is not always practical to set environment variables on development machines or continuous integration servers where multiple projects are run. dotenv loads variables from a .env file into ENV when the environment is bootstrapped."
gem  rails  ruby  configuration  credentials  password  security  key  identifier  load  environment  vairable  set  define  file 
february 2016 by ebouchut
mmozuras/pronto: Automated Code review styleguide, security
"Pronto runs analysis quickly by checking only the relevant changes. Created to be used on pull requests, but also works locally and integrates with GitLab. Perfect if want to find out quickly if branch introduces changes that conform to your styleguide, are DRY, don't introduce security holes and more."

gem install pronto pronto-brakeman pronto-coffeelint pronto-eslint pronto-fasterer pronto-flay pronto-jshint pronto-json pronto-haml pronto-poper pronto-rails_best_practices pronto-reek pronto-rubocop pronto-scss

Install a pre-push hook for git

ruby  github  gitlab  automation  code  review  security  analysis  styleguide  pull  request  automate  rails  rubyonrails  automatic  static  complexity  analyze  rubocop  smell  git  commit  message  duplication  find  issue  problem  style  guide  unused  variable 
december 2015 by ebouchut
Dependency management + Code analytics for Node.js projects
"bitHound is tackling a huge problem for us developers. We all use many dependencies (NPM, bower, etc.) in our code. bitHound lets me know instantly if my dependencies are up to date, secure, and meet my standards! Not to mention highlighting all of the areas in my code that need attention. Coding without bitHound is similar to having your brains smashed in by a slice of lemon wrapped round a large gold brick."
javascript  bower  npm  dependency  security  check  analysis  update  outdated  code  node.js  node 
october 2015 by ebouchut
"Gemnasium monitors your project dependencies and alerts you about updates and security vulnerabilities. Your project might be using a dangerous dependency, we will notify you as soon as advisories are public and affect your projects. "
gem  ruby  rails  update  notify  notification  new  version  release  updated  online  service  alert  monitor  Gemfile  security  upgrade 
august 2015 by ebouchut
How to Find Wi-Fi Network Passwords from Command Line on Mac
security find-generic-password -ga "ROUTERNAME" | grep "password:"
mac  security  find  password  router  WIFI  macos  CLI  command  show  recover  network 
july 2015 by ebouchut
crypto-js - JavaScript implementations of standard and secure cryptographic algorithms - Google Project Hosting
"CryptoJS is a growing collection of standard and secure cryptographic algorithms implemented in JavaScript using best practices and patterns. They are fast, and they have a consistent and simple interface. "
cryptography  security  library  javascript 
february 2015 by ebouchut
Brakeman - Static analysis security scanner for Ruby on Rails
"Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code to find security issues at any stage of development."
rails  rubyonrails  security  check  scan  find  search  source  code  static  vulnerability  CVE  exposure  issue 
august 2014 by ebouchut
OS X: About Gatekeeper
To remove the window that pops up every time you launch a non signed MacOS app:
- right click the app
- select open
- Click Ok
prevent  warning  message  launch  start  run  application  mac  macos  network  non  not  signed  gatekeeper  security 
january 2014 by ebouchut
OmiAuth: Standardized Multi-Provider Authentication
"OmniAuth is a library that standardizes multi-provider authentication for web applications. It was created to be powerful, flexible, and do as little as possible. Any developer can create strategies for OmniAuth that can authenticate users via disparate systems. OmniAuth strategies have been created for everything from Facebook to LDAP."
authentication  gem  ruby  rubyonrails  rails  security  provider  multiple  library  API  LDAP  facebook 
november 2013 by ebouchut
« earlier      
per page:    204080120160

related tags

2-factor  2FA  access  account  activation  active  AD  add  add-on  addon  addons  administration  adress  AES  agent  airpot  AJAX  alarm  alert  allow  alternative  amazon  analyser  analysis  analyze  anti  antispam  antivirus  apache  API  app  apple  application  assignment  assistant  atribute  attack  attributes  attr_accessible  authentication  authenticity  authenticity_token  authority  authorize  automate  automatic  automation  autoradio  awesome  AWS  axcrypt  backup  bank  begin  bfg  big  binary  black  block  blog  blowfish  book  bot  bower  breach  browser  bug  ca  calculator  camera  car  card  CB  CBC  CD  cert  certifcate  certificate  certification  change  character  chart  chat  check  checkpoint  checksum  chiffrement  chrome  cipher  class  classloader  clean  cleaner  clear  CLI  client  cloud  CMS  code  collaborate  command  commit  communication  compare  comparison  complex  complexity  compute  conference  config  configuration  configure  connect  connection  connector  connexion  console  container  content  control  controller  conversion  convert  cookie  cookies  CORS  crack  cracker  create  credential  credentials  cross  crossdomain.xml  crt  crypt  cryptography  CSP  csr  CSRF  curl  CVE  cyber  cypher  data  database  date  deblocage  debloquer  debug  debugging  decalage  decrypt  define  delete  dependency  der  detect  detection  dev  development  device  digest  directory  disk  display  DKIM  DNS  document  documentation  domain  domainkeys  download  drive  droite  dropbox  dump  duplication  ebook  editor  effaceur  email  emergency  encrypt  encryption  encypt  end  enforce  environment  eraser  error  espionage  EU  exception  exchange  executable  expiration  expire  exploit  exposure  extension  extensions  facebook  factor  failure  file  filetype:pdf  fill  filter  filter-branch  find  firefox  firewall  FISAAA  flash  flaw  focus  folder  forbid  forbidden  forgery  form  format  framework  free  freeware  french  FTP  game  gatekeeper  gauche  gem  Gemfile  generate  generator  geotrust  get  git  github  gitlab  globally  gmail  gnu  google  google-drive  GPG  GPU  grade  grc  Gtalk  GTD  guard  GUID  guide  guideline  hack  hacker  hacking  hamachi  handle  hardware  hat  hide  hijackthis  history  home  hook  hotspot  howto  HSM  HSTS  HTML  html5  HTTP  https  IAM  ibm  id  identifier  identity  ie  ie8  IM  in  info  inform  injection  insecure  install  integer  integrity  intelligence  intermediate  internet  intrusion  inventory  ios  IP  iphone  IRC  isolate  isolation  ISP  issue  issuer  java  javascript  jconsole  jmx  JSON  jsonp  key  keychain  keylogger  keystore  language  launch  law  LDAP  leak  learn  lease  left  legal  lettre  library  line  linux  list  load  loader  lock  login  lost  mac  machine  macos  malware  man  manage  management  manager  map  mass  MBSA  md5crypt  media:document  message  metasploit  microservice  microsoft  middle  missing  MITM  mixed  module  monitor  monitoring  motion  mouvement  multiple  my  name  network  networking  new  nginx  NIST  nmap  no  node  node.js  non  not  notification  notify  novel  npm  NSS  NVD  oauth  oauth2  obfuscate  online  onlykey  open  opendns  opensource  openssl  openvpn  opera  oracle  origin  os  osx  OTP  outdated  outlook  p12  page  parameter  party  password  password-less  password-manager  pasword  payload  pdf  pem  perfect  performance  permit  permitted  pfx  PGP  phishing  phone  PHP  phpass  pidgin  piratage  PKCS  pkcs7  pkcs12  pki  plugin  policy  pomodoro  port  post  postgres  PPP  prevent  print  privacy  private  problem  process  productivity  program  programmign  programming  project  pronto  properties  property  protect  protection  protect_from_forgery  protocol  provider  proxy  public  pull  push  put  putty  radio  rails  rails4  rebinding  receive  recover  recovery  redirect  reference  release  remote  removal  remove  renault  report  repository  request  resource  resources  review  revocate  rewrite  RFC  right  rmi  robot  root  rootkit  ror  rotate  rotation  router  rubocop  ruby  rubygem  rubyonrails  run  russinovich  S/MIME  same  sample  sandbox  sanitize  scan  scanner  screen  scripting  search  secret  secunia  secure  security  sensor  server  service  set  settings  setup  SFTP  SHA  SHA1  SHA256  SHA512  share  sharing  shift  show  side  signature  signed  SIM  site  SKU  smell  software  SOP  source  sourceforge  spam  sppof  spyware  SQL  ssh  ssh-agent  ssl  SSO  starred  start  static  stolen  storage  store  strage  strength  string  strong  style  styleguide  subscribe  suffix  surveillance  sysadmin  sysinternals  system  talk  task  TCP  TDD  test  testing  text  the  thief  third  threat  time  timer  TLD  TLS  todo  token  tomcat  tool  toolbag  tools  toread  TOTP  tracking  trigger  trojan  troubleshooting  tunnel  tutorial  U2F  unique  unlock  unused  update  updated  upgrade  upload  urgence  url  USA  USB  user  UUID  vairable  valid  validate  validation  value  variable  verify  version  video  view  virtual  virtualization  virus  VM  vmware  voiture  vol  VPN  vulnerability  warning  web  weblogic  webservices  websphere  whitelist  WI-FI  wifi  windows  wipe  wordpress  wp-config  wpa  WPA2  wrapper  write  ws  X-CSRF-TOKEN  X-XSS-Protection  x509  xchat  XHR  XP  xss  yahoo  yubico  yubikey 

Copy this bookmark: