gilberto5757 + security   513

GitHub - dag0310/vernam: Perfect Secrecy Messenger App
GitHub is where people build software. More than 28 million people use GitHub to discover, fork, and contribute to over 85 million projects.
encryption  security  messaging  application  vernam  cipher  qrcode  key  exchange  opensource  floss 
8 days ago by gilberto5757
Security Aware Programming Language — Why, How and Ballerina!
In a time where application security vulnerability indices struggle to keep up with the drastic growth of different attack vectors, it is not a surprise that application engineers will overlook new…
ballerina  language  security  article  api  distributed  programming 
12 days ago by gilberto5757
GitHub - google/gvisor: Sandboxed Container Runtime
GitHub is where people build software. More than 27 million people use GitHub to discover, fork, and contribute to over 80 million projects.
linux  sandbox  container  security  process  opensource  floss 
11 weeks ago by gilberto5757
9 Android settings that'll strengthen your security | Computerworld
Android's own native security options aren't always obvious — but they're absolutely worth your while to embrace and understand.
android  security  setting  tool 
12 weeks ago by gilberto5757
What is Windows Hello? Microsoft’s biometrics security system explained | Computerworld
Windows Hello gives Windows 10 users an alternative way to log into their devices and applications using a fingerprint, iris scan or facial recognition. Here’s what the technology does, who uses it and the hardware required.
windowshello  biometric  security  fido2 
12 weeks ago by gilberto5757
Why Linux is better than Windows or macOS for security | TechConnect
Decisions made years ago about which operating system to roll out can affect corporate security today. Of the big three in widespread use, one can credibly be called the most secure.
windows  linux  mac  osx  security  comparison 
march 2018 by gilberto5757
I’m harvesting credit card numbers and passwords from your site. Here’s how.
The following is a true story. Or maybe it’s just based on a true story. Perhaps it’s not true at all. It’s been a frantic week of security scares — it seems like every day there’s a new…
maninthemiddle  security  data  harvesting  prevention 
february 2018 by gilberto5757
Common approaches to securing Linux servers and what runs on them.
Are we always doing everything that is necessary to secure, and I mean really seriously secure, any valuable server containing sensitive information on the internet? According to Shodan, the answer…
linux  security  bestpractice  technique  approach 
february 2018 by gilberto5757
The 6 best password managers | CSO Online
Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure.
password  manager  repository  security  list  review 
january 2018 by gilberto5757
Why microservices are a security issue |
Explore how the principles behind open source--collaboration, transparency, and rapid prototyping--are proven catalysts for innovation.
microservice  security  issue  approach  decomposition 
november 2017 by gilberto5757
Okta | Always On
Provide secure identity management and single sign-on to any application, whether in the cloud, on-premises or on a mobile device for your employees, partners and customers with Okta.
sso  identity  management  directory  security  authentication  saas  cloud  online  service  api 
november 2017 by gilberto5757
Privacy Pass: A browser extension for anonymous authentication
Today we are releasing a new browser extension for Chrome and Firefox named Privacy Pass. Privacy Pass uses privacy-preserving cryptography to allow users to authenticate to services without…
security  authentication  privacy  anonymous  protocol 
november 2017 by gilberto5757
Why the way you SSH to boxes is insecure – Opsolutely
We at Opsolutely have worked on enough significant production systems to know that no metrics package in the world replaces the need to sometimes ssh to your machines. When your users are impacted…
ssh  security  temporary  login  onetime  kerberos  ldap 
october 2017 by gilberto5757
Designing an Enterprise Role-Based Access Control (RBAC) System
Role-based access control (RBAC) is an approach to restricting system access to users based on defined roles. Many companies have built internal system like these, but usually in a very archaic and…
role  access  control  security  rbac  enterprise 
october 2017 by gilberto5757
how to hack the uk tax system, i guess – Zemnmez – Medium
As I am now an adult, I sometimes need to look at taxes. The longstanding tradition of adults dictates that I must look at my taxes and say to my fellow adults “wow, I wish I had that money which is…
uk  tax  security  vulnerability  web  xss 
september 2017 by gilberto5757
How the NSA identified Satoshi Nakamoto – Alexander Muse – Medium
The ‘creator’ of Bitcoin, Satoshi Nakamoto, is the world’s most elusive billionaire. Very few people outside of the Department of Homeland Security know Satoshi’s real name. In fact, DHS will not…
nsa  bitcoin  security  surveillance  privacy  stylometry  writing  text  style  identification  author 
august 2017 by gilberto5757
« earlier      
per page:    204080120160

related tags

4g  802.11  abandonment  absent  access  accesspoint  account  acl  acrobat  activation  activedirectory  activity  ad  address  administration  adoption  advanced  advantage  advertising  advice  advocacy  aes  ai  ajax  algorithm  alteration  alternative  amahi  amanda  analysis  analyzer  android  androidforwork  animation  announcement  anomaly  anonimity  anonymiser  anonymity  anonymizer  anonymous  antimalware  antipattern  antispam  antivirus  apache  api  apparmor  apple  applescript  appliance  application  approach  archive  archiving  area  article  artificial  asciiart  aspnet  assembly  assistance  assisted  asymmetrical  attack  audio  authentication  author  authority  authorization  automated  automatic  automation  automotive  avoiding  backdoor  backup  ballerina  bank  banking  banner  basis  behavior  bestpractice  bigdata  biggest  biometric  biometrical  bios  bitcoin  bitlocker  bittorrent  bloat  blockchain  blog  bluetooth  boot  bootable  bootloader  bot  botnet  box  brainfuck  breach  browser  bruteforce  bsd  bug  business  byod  bypass  c  c++  ca  cacert  cache  call  caller  camera  capability  captcha  car  card  case  cat  caution  cellular  censorship  centralized  cern  certificate  certificateless  certification  cgroup  charger  chat  cheap  cheating  cheatsheet  checker  checksum  chess  china  choice  chrome  chroot  cipher  clang  classic  cleaning  cleansing  cleanup  client  clientside  cloaked  cloub  cloud  cloudcomputing  cloudflare  code  coding  collaboration  collection  column  comment  communication  comparison  compiler  complete  compliance  compression  computer  computing  concurrency  configuration  configurator  connection  construction  consultant  contactlist  container  continuity  control  convenience  conversion  converter  cookie  cookiejacking  copier  copy  corporate  cover  coverage  cpp  CPU  crack  cracking  craft  credential  creditcard  criticism  crossdomain  crowdfunding  crypto  cryptocurrency  cryptography  cube  curve  cvs  cybersecurity  cyberwar  darkmail  darknet  darkweb  data  database  datamasking  ddefect  ddos  debugger  debugging  decomposition  default  defect  defective  defense  defibrillator  deficiency  delete  deletion  demonstration  deployment  derivative  description  design  desktop  destruction  detection  detector  development  deviation  device  diaspora  dictionary  diffusion  directory  directx  disaster  discussion  disinfection  disk  display  disposable  disposal  distributed  distro  diy  django  dlp  dns  dnschanger  docker  document  domainkeys  domainname  domotics  donationware  dongle  donotuse  dos  dotnet  double  doublefactor  download  downloadable  drm  drone  drones  dropbox  dsl  duplicate  duplication  dutch  dynamic  e  easy  ecm  ecommerce  editing  editor  education  educational  ejb3  eliza  elliptic  email  embedded  emission  encoder  encription  encryprion  encrypted  encryption  endpoint  enforcement  engine  engineering  enhancement  enlargement  enterprise  entertainment  entropy  environment  eps  error  escalation  esoteric  ethernet  evolution  example  excel  exchange  executable  exokernel  experiment  experimental  explanation  exploit  explorer  explosion  extension  external  facebook  fake  faking  false  favorite  fde  feature  fido  fido2  file  filebound  filemanager  filesharing  filesize  filesystem  filetransfer  filevault  fillup  filter  filtering  finance  fingerprint  firewall  fixup  flash  flaw  floss  flow  fm  forensic  forensics  format  fortress  forum  framework  free  freedom  freenet  freeware  friend  fritz  frontend  fud  full  fuse  gadget  game  gatekeeper  gateway  gdb  gdpr  generation  generator  girl  github  gnome  gnu  gnupg  google  governance  gpg  graphic  group  grub  gui  guid  guide  hack  hacker  hacking  hadoop  handshake  harddisk  harddrive  hardened  hardening  hardware  harvesting  hash  hashing  hazard  hd  header  headset  health  healthcare  hidden  hierarchical  hijacking  historical  history  hole  home  homebrew  honeypot  horse  host  hosted  hotspot  howto  hsts  html5  http  https  humour  ia32  icann  id  identification  identifier  identity  ie  iframe  iis  im  image  implementation  inbox  inbrowser  incomplete  incremental  info  ingdirect  init  injection  inline  innovation  instant  instantmessaging  instruction  integrated  intel  interactive  intercepting  interchange  interface  internal  internet  internetexplorer  internetofthings  interpreted  interval  intro  intrusion  inutility  invisible  invite  ios  ipad  iphone  ipod  ips  ipsec  iptabes  iptables  isolation  issue  it  italian  itprofessional  jail  java  javascript  jee  join  joke  journalism  jpa  jpeg  jquery  js  json  justice  jvm  kaspersky  kde  kerberos  kernel  key  keyboard  keyless  keylogger  kid  knocking  label  labeling  language  laptop  largest  lastpass  launchd  law  layer  layer2  ldap  leak  leakage  learning  leeching  lenght  letsencrypt  level  library  license  licensing  lightweight  lim  limit  limitation  limited  linkevel  linux  list  live  loadbalancer  loaf  local  localdb  lock  lockdown  locker  log  logger  logging  login  loss  lossy  lost  loudspeaker  low  lte  lxc  mac  macdefender  machine  mail  mailbox  mainframe  maintenance  malicious  malware  management  manager  mandatory  mangement  maninthemiddle  manipulation  manual  martinfowler  masking  math  matrix  md5  mdm  measure  measuring  media  medicine  memory  message  messaging  messenger  metaphor  meteor  microcontroller  microphone  microservice  microsoft  migration  mining  misconfiguration  missing  mistake  mobile  modification  money  monitoring  mountainlion  mssql  multifactor  multimedia  multiplatform  multiple  multiplexer  multiplexing  multiuser  music  mutual  mysql  myth  nacl  native  navigation  ncrypted  necessity  needed  netfilter  network  networked  networking  new  news  newsgroup  newyorker  new_yorker  nintendo  nmap  nodejs  notetaking  nsa  number  oath  oauth  obfuscated  obfuscation  obfuscator  objectivec  obsolescence  obsolescense  obsolete  ocr  office365  offline  old  onboard  onedrive  onetime  onetimepad  onetimepassword  onion  online  only  open  openid  openpgp  opensource  openssh  openvz  operating  opinion  optimisation  optimization  oracle  os  osx  otp  outlook  overrated  p2p  pacemaker  packet  padding  page  pam  paper  paranoid  partition  password  passwordless  passwordmaker  path  payload  payment  pc  pdf  pen  people  performance  personal  pgp  phone  photo  php  phreaking  physical  picture  pin  pipa  piracy  pixel  pki  plaintext  plasma  player  playing  plist  plugin  poetry  point  police  policy  politics  port  portable  portal  porting  portknocking  pos  possesion  postgresql  power  powershell  precaution  presence  preservation  prevention  prey  printed  printer  printing  printout  privacy  private  privatekey  privilege  problem  process  processor  product  production  professional  profile  program  programming  project  proposal  protection  protocol  provider  proxy  pseudorandom  public  putty  python  qrcode  quality  quantum  query  radio  radius  ram  ramdisk  random  randomization  ransomware  rant  rar  raspberrypi  rbac  reaction  reader  reading  readonly  readytouse  real  recording  recoverable  recovery  redaction  redirect  refactoring  reference  regulation  relay  relevance  remote  removal  remover  rename  repair  replacement  repository  requirement  research  reseller  reset  resistant  resizing  restriction  reverse  review  risk  rng  robbery  robot  rogue  role  root  rootkit  rot  router  routing  row  rubik  rule  running  russinovich  rust  saas  safe  salt  sameorigin  saml  sandbox  saturation  scala  scan  scanner  scanning  screen  screenshot  script  scripting  sdcard  search  searchengine  secret  secure  secureboot  securecrt  security  selfdestructable  selfdriving  selinux  sending  sensor  separate  separation  server  serverside  service  session  setting  sha1  sharing  shishi  shop  shuffled  shutter  signing  simulator  singleprocess  singlesignon  sintelligence  sip  site  size  skype  smack  smartcard  smarthome  smartphone  smime  sms  smtp  snapshot  snippet  social  socialnetwork  socks  software  solution  sopa  sort  sound  source  space  spam  special  specialized  speed  speedup  split  spreading  spyware  sql  sqlite  sqlserver2005  ssh  ssl  sso  stackable  stamp  standard  startup  static  statical  stationery  steal  stealing  stealth  stegano  steganographic  steganography  storage  store  strategy  string  structure  stupidity  style  stylometry  subtraction  sudo  suggestion  surveillance  svg  switch  switzerland  sync  sysadmin  sysinternals  system  tab  tablet  tag  takedown  tampering  tax  tcp  technique  technology  teenager  telephone  telephony  tempest  temporary  terminal  testing  text  tfowactor  theft  theory  thinclient  thirdpart  thread  threading  threat  time  timemachine  tip  tls  token  toll  tool  toolkit  tor  torrent  total  tpm  trace  tracing  tracking  traffic  training  transaction  transfer  trashmail  trial  trick  trojan  truecrypt  trust  trusted  trustedcomputing  tunisia  tunnel  tutorial  tweak  twofactor  uac  ubuntu  uefi  uk  uncommon  undelete  undocumented  unicode  unified  unikernel  unix  unknown  unlock  unprivileged  unresolved  untrusted  unwanted  usability  usb  use  useful  user  userland  usermount  username  userspace  utilities  utility  uTorrent  validation  vault  verification  verify  vernam  version  video  videoconference  view  violation  virtual  virtualization  virtualmachine  virus  visual  vm  voice  voicemail  voip  volume  vpn  vulnerability  vulnerable  wallet  war  warfare  warning  warrant  wayland  weak  weakness  web  webapplication  webdec  webdesign  webdev  webhosting  weboftrust  webpage  webserver  website  whiteboard  whitelist  whitespace  wifi  wifidirect  wiki  win81  windows  windows7  windows8  windows10  windowshello  windowstogo  windowsxp  wininternals  wipeout  wireless  wlan  woman  word  wordpress  work  workstation  wot  wpa  wpa2  wrapper  writing  x11  x86  x509  xbox360  xen  xerox  xlock  xml  xmpp  xss  young  zip 

Copy this bookmark: