2607
Twitter
When you WannaCry but gives you the strength to go on.
from twitter_favs
7 days ago
Twitter
RT : You have fallen into the logical trap of thinking vulnerability r…
from twitter_favs
15 days ago
dxa4481/truffleHog: Searches through git repositories for high entropy strings, digging deep into commit history
Searches through git repositories for high entropy strings, digging deep into commit history
code  git  passwords  Security 
9 weeks ago
Twitter
RT : Please RT far and wide. The ICE raids have started in 6 states.
from twitter_favs
february 2017
Twitter
These 7 measures for improving server security will keep your system safer. Find out how you can implement them:…
from twitter_favs
february 2017
Twitter
RT : DoD data (cleared for release) shows on average 1/3 of vulns in government systems is in the security software.
from twitter_favs
january 2017
Twitter
"Du verdienst mit 2000€ Brutto/Monat für dieselbe Arbeit 7% weniger als dein Kollege. Berechne deine Verluste/Jahr…
from twitter_favs
january 2017
Twitter
RT : Alternative Methoden boomen....
from twitter_favs
january 2017
Twitter
RT : UK study: Bathroom signage should describe what — not who — is inside
from twitter_favs
january 2017
Twitter
RT : CNN uses screenshot from ‘Fallout 4’ to show how Russians hack things
from twitter_favs
january 2017
CNN uses screenshot from ‘Fallout 4’ to show how Russians hack things – BGR
RT : CNN uses screenshot from ‘Fallout 4’ to show how Russians hack things
from twitter_favs
january 2017
Twitter
RT : My 81 year-old dad thought this up and asked me to post it. I'm supposed to let him know if it goes viral. :)
from twitter_favs
january 2017
Twitter
This is how people ignored each other before smartphones
from twitter_favs
december 2016
Twitter
RT : Was inspired by my earlier comment. I drew the "Circles of Infosec Hell"
infosec  from twitter_favs
december 2016
« earlier      
accessibility ajax analysis ansible apache apps archlinux art backup bash bgp bind blog boot browser bsd business cache cheatsheet cisco cli cluster color comparison console couchdb cracking creativecommons crypt css css3 culture database datenschutz debian debug design desktop development devops diy django dns docker documentation ebook education email encryption exploit ext3 fail faq filesystem filetype:jpg filetype:pdf fink.weitergeben firefox firewall font fonts forms framework free freebsd fuckup fun geek gesellschaft git google gpg graphics graphite gui guide hack hacking hacks hardware hash howto html html5 http humor icon icons image inspiration interface internet intro ip iptables ipv6 jabber javascript jquery kernel kotzen latex learning lesbar license linux list logging maemo mail management media media:document media:image monitoring music musik mysql n810 netlabel network networking news nginx opensource optimization password pdf pentest performance photography php plugin plugins politics politik presentation privacy productivity programming proxy python recht reference regex resources rl router routing ruby satire scalability scripting security server shell sicherheit slides software spam sql ssh ssl statistics storage streaming svn sysadmin system tcp template test testing tex theme tips tls todo tools toread tuning tutorial tweak typographie typography umgang unicode unix usability video vim virtualization vista visualization vpn wallpaper web webdesign webdev wifi wiki windows wireless wordpress work workflow xhtml xmpp zeitgeschehen zensur zfs Überwachung überwachung

Copy this bookmark:



description:


tags: