websitejk + jk-infosec   131

Email Header Analyzer -®
There could be several IP addresses listed within a single email header. Each IP could represent a server to which the email went through to get to its destination.
jk-analyst  jk-email  jk-infosec 
6 days ago by websitejk
Email Headers Can Tell You About the Origin of Spam
Want to know where all the junk mail is really coming from? Find out how the source of spam can be determined using an email's header lines.
jk-infosec  jk-mail  jk-analyst  jk-career  jk-training 
12 days ago by websitejk
Buttercup, a password manager for Linux - OSRadar Open Source - Technology
Many people are concerned about your security and prefer to use a password manager to centralize and safeguard their information.
jk-infosec  jk-linux  jk-software  jk-tools 
19 days ago by websitejk
DigitalOcean Ubuntu 18.04 droplets? |
When will DigitalOcean release Droplet images for Ubuntu Server 18.04 LTS (Bionic Beaver)?
jk-homenetwork  jk-siem  jk-engineer  jk-infosec  jk-vm  jk-virtual 
21 days ago by websitejk
Google Killed Chrome Apps, But You Can Easily Make Your Own
If you live in Chrome the way I live in Chrome (which is basically all the time) but also appreciate running webapps in dedicated windows for better multitasking, Applicationize is a killer tool to have in your toolbox.
jk-infosec  jk-software  jk-tools  jk-homenetwork  jk-sysadmin 
4 weeks ago by websitejk
How to Perform a Clean Boot in Windows
Modern computers come loaded with hundreds of processes and services designed to make the operating system run smoothly. Sometimes when you install a program or service, they may interfere with crucial services, resulting in unexpected program crashes, error messages popping up, or slowing down your computer.
jk-infosec  jk-software  jk-tools  jk-homenetwork  jk-sysadmin 
4 weeks ago by websitejk
How to Lock Down TeamViewer for More Secure Remote Access
TeamViewer is a great free program, whether you want to access your computer from afar or help out friends and relatives with their computer. But its default settings are remarkably insecure, instead favoring ease of use. Here’s how to lock down TeamViewer so you can make use of its features without opening yourself up to attack.
jk-infosec  jk-software  jk-tools  jk-homenetwork  jk-sysadmin 
4 weeks ago by websitejk
devsecops is an informational site for security and business
practitioners looking for innovative ways to incorporate security at scale.
jk-infosec  jk-career  jk-bizdev  jk-agile 
5 weeks ago by websitejk
Blog — devsecops is an informational site for security and business
practitioners looking for innovative ways to incorporate security at scale.
jk-career  jk-secdevops  jk-agile  jk-infosec  jk-syntax 
5 weeks ago by websitejk
AWS Security Partner Solutions
Learn how AWS Lambda Partners provide services and tools that help customers build or manage serverless architecture.
jk-infosec  jk-engineer  jk-cloud 
8 weeks ago by websitejk
Location History Visualizer Pro
In-depth analysis of your Google Location History for Mac, Windows, and Linux. Map, search, filter, and analyze.
jk-homenetwork  jk-software  jk-cloudedhat  jk-infosec  jk-tools  jk-privacy 
12 weeks ago by websitejk
Google Transparency Report
Google’s Transparency Report shares data that sheds light on how the policies and actions of governments and corporations affect privacy, security, and access to information.
jk-infosec  jk-tools  jk-bizdev 
september 2018 by websitejk
Repeated incoming connections from odd sources - Networking
Hoping someone can provide some insight here. I'm running a Verizon Quantum Gateway and have it setup to reject all incoming connections but allow all outgoing connections (default). Until today I was...
jk-analyst  jk-infosec  jk-homenetwork  jk-network 
september 2018 by websitejk
Hunting with Splunk: The Basics
Create a solid base of knowledge that you can use in your own environment to hunt for evil using Splunk
blog  cybersecurity  splunk  threathunting  to  read  jk-analyst  jk-infosec  jk-engineer 
september 2018 by websitejk
Security News Daily - Hacking, Encryption and Online Privacy News
Here’s every Tom’s Hardware article using the tag Security. Also, see what the Tom’s Hardware community has to say about: Security.
jk-infosec  jk-secfeed 
september 2018 by websitejk
FOCA is a tool that analyzes, extracts and classifies hidden information from web servers
jk-infosec  jk-forensics  jk-analyst  jk-engineer 
august 2018 by websitejk
UltraTools | Free Domain, DNS, WHOIS & IP Lookup Tools
UltraTools is a complete set of free DNS and domain tools, which test the health of your domain name servers, websites and online hosting environment.
jk-analyst  jk-engineer  jk-tools  jk-infosec 
august 2018 by websitejk
FAQ | Rangeforce
Game-based hands-on cyber security training for developers, devops and system administrators.
jk-b7  jk-training  jk-career  jk-infosec  jk-engineer 
august 2018 by websitejk
A Picture is Worth a Thousand Words, Including Your Location | Electronic Frontier Foundation
At first blush, it seems obvious that a picture could reveal your location. A picture of you standing in front of the Golden Gate Bridge sensibly leads to the conclusion you're in the San Francisco Bay Area when the photo was taken. But now that smartphones are quickly supplanting traditional...
jk-blog  jk-holyshit  jk-images  jk-photo  jk-infosec  exif  flickr  geo  leftwardthinking  location 
august 2018 by websitejk
How to scan whole internet in less than 45 minutes? • askthehackers
With help of more advanced tools like Zmap, Masscan and a decent internet connection. These tools perform asynchronous scan by simply firing TCP-SYN packets
jk-infosec  jk-analyst  jk-engineer  jk-tools  jk-soc 
august 2018 by websitejk
Man vs. Machine: Speed and Scale in Threat Intelligence
In this infographic, we’ve calculated some of the benefits of automating collection and analysis of threat data using machine learning and AI.
jk-infosec  jk-engineer  jk-soc  jk-blog 
august 2018 by websitejk
Save hundreds of labor hours per year starting at only $49 usd per month. Integrations exist today with services such as Security Scorecard, Shodan, Acunetix, Nessus and many more.
jk-infosec  jk-engineer  jk-pentest  jk-tools 
august 2018 by websitejk
SOC Series: How to Make a Security Operations Center More Efficient
Now that you've got your security operations center in place, what do you do next? Time to optimize for efficiency.
jk-engineer  jk-analyst  jk-soc  jk-infosec 
august 2018 by websitejk
« earlier      
per page:    204080120160

related tags

a-2016  advice  analysis  blockchain  blog  Bookmarks_bar  containers  cookies  cybersecurity  dataset  ddg  e-discovery  ediscovery  eff  exif  flickr  free  geo  google  header  howto  IFTTT  infosec  intelligence  Internetjk-tools  Java  JDK  jk-2aj  jk-a6  jk-advanced  jk-agile  jk-analyst  jk-android  jk-anon  jk-authentication  jk-b7  jk-bestpractice  jk-bizdev  jk-blockchain  jk-blog  jk-bunker  jk-business  jk-career  jk-choc  jk-cloud  jk-cloudedhat  jk-coding  jk-crypto  jk-dashboard  jk-ecsa  jk-ediscovery  jk-email  jk-engineer  jk-fisma  jk-forensics  jk-h4xx0r  jk-holyshit  jk-homenetwork  jk-ia  jk-images  jk-infosec  jk-kevin  jk-linux  jk-mail  jk-mindmap  jk-monitoring  jk-nerdout  jk-network  jk-pentest  jk-photo  jk-pi  jk-politics  jk-privacy  jk-python  jk-recovery  jk-rel8  jk-secdevops  jk-secfeed  jk-siem  jk-soc  jk-software  jk-syntax  jk-sysadmin  jk-tools  jk-training  jk-video  jk-virtual  jk-vm  jk-vpn  jk-webapp  jk-windows  jk-www  lambda  leftwardthinking  Licence  linux  location  message  network  networking  online  Oracle  OSINT  Pocket  privacy  read  recon  reference  search  security  sec_eng  serverless  splunk  statistics  surveillance  threathunting  tips  to  tool  Tools  vpn  web  webapp  wide  world 

Copy this bookmark: