public marks

PUBLIC MARKS with tags security & google

2020

📛 SÉCURITÉ - cybermalveillance.gouv.fr - l'arnaque à la webcam piratée revient avec le confinement - Comment Ça Marche

by decembre
cybermalveillance.gouv.fr est une plateforme en ligne mise en place par le groupement d'intérêt public (GIP) Acyma (Action contre la cybermalveillance), qui regroupe des membres tels que l'Afnic, l'UFC-Que Choisir, le Clusif, La Poste, Orange, Bouygues Telecom et Google – parmi d'autres acteurs – mais aussi plusieurs ministères. Son tôle principal consiste à informer les utilisateurs – particuliers comme professionnels ou associatifs – des dangers liés à l'usage du numérique en général et d'Internet en particulier. Outre son site Web sur lequel on trouve de précieux conseils pratiques, Cybermalveillance offre deux services téléphoniques : – Info Escroqueries, au 0 805 805 817 (appel gratuit) du lundi au vendredi de 9 h 00 à 18 h 30 (service du ministère de l’Intérieur). – Net Écoute, au 0 800 200 000 (appel gratuit), du lundi au vendredi de 9 h 00 à 19 h 00, ligne d’écoute nationale anonyme et confidentielle destinée aux internautes confrontés à des problèmes dans leurs usages numériques.

2014

NSA uses Google cookies to pinpoint targets for hacking - The Washington Post

by sbrothier (via)
The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using "cookies" and location data to pinpoint targets for government hacking and to bolster surveillance.

2013

2011

good coders code, great reuse

by pkrumins
Peteris Krumins' blog about programming, hacking, software reuse, software ideas, computer security, google and technology.

2010

How can I check the password of the IUSR and IWAM local accounts on a machine?

by brianwaustin (via)
Windows IT Pro For Admins SuperSite For Tech Enthusiasts SQL Server Mag For DBAs DevProConnections For Developers SharePointPro Connections For IT & Dev Windows IT Pro, we're in IT with you About Advertise Subscribe Follow Us RSS Why Join My Account Register Sign In Search InstantDoc ID GO Browse By: Author | Issue * Home * news o Paul Thurrott's WinInfo News * blogs o Active Directory GPO and Identity o Active Directory Troubleshooting Tips and Tricks o Business Technology Perspectives o exchange and outlook o fearless security o hyperbole embellishment sys admin o IT Research Perspectives o Michael Otey o networking and hardware o Office and SharePoint o PowerShell with a Purpose o scripting o security o security matters o virtualization o Virtualization Pro Tips o Windows Automation o Windows OS and Deployment * FAQs o Exchange and Outlook Tips &Techniques o John Savill's FAQs o PowerShell FAQs o Virtualization FAQs o Windows Gatekeeper FAQs o FAQ Submittal Form * products & reviews o awards central o buyers guides o reviews * newsletters * Events o Conferences & Workshops o eLearning Seminars o Virtual Events o web seminars * community o Follow Us o Forums o User Group Central * resources o ebooks o essential guides o podcasts o tip guides o trials & downloads o videos & more o web seminars o white papers * international o europe * more o network monitoring management o hp virtualization o google apps cloud based infrastructure o MVP-system o Windows 7 o HP Intel Microsoft Unified Communications o VMware Desktop Virtualization with VMware View o Business services made simple + IT as a service made simple + IT as a Service Blog o doing windows 7 right o VMware Virtualizing Business-Critical Applications o VMware Virtualizing Exchange Polland Article o VMware Virtualizing Oracle Polland Article o VMware Virtualizing SAP Polland Article o Cloud Twitterview Paul Thurrott Sean Deuby Nov19 o Essentials Series Downloads * Subscribe Home » Passwords » How can I check the password of the IUSR and IWAM local accounts on a machine?

skipfish - Project Hosting on Google Code

by Xavier Lacot
A fully automated, active web application security reconnaissance tool. It creates a html reports which might prove useful for detecting security flaws or conception problems.

Operation Aurora

by marco
Operation Aurora was a cyber attack conducted in mid-December 2009 and continuing into early January 2010.

Internet Survival Guide for Traveling Where Privacy Isn't Respected - Google - Lifehacker

by ghis
Two things have really changed the face of independent backpacker travel in the last decade: digital cameras and—even more so—the internet. While some people can afford the luxury of traveling with a laptop or even a netbook, a real backpacker doesn't want to have to carry the extra weight nor the responsibility of carrying expensive equipment that would be difficult to lug around, relatively easy to steal, and expensive to replace.

2009

http://ping.fm/4gN72

by kemar
"You're No One If You're Not On Twitter" chanson sur twitter à écouter absolument ! http://ping.fm/4gN72 [from http://twitter.com/kemar/statuses/898884937]

google-caja - Project Hosting on Google Code

by julie & 5 others
Caja (pronounced "KA-ha") allows you to put untrusted third-party HTML and JavaScript inline in your page and still be secure.

Scroogle Scraper

by ycc2106
For Scroogle, SSL is used to hide your search terms. Your IP address is dropped before your search terms are sent to Google. In case of "employer spyware" packages such as Websense. If you use Wi-Fi and you haven't set up your router for secure operation, or in some countries, the government could be monitoring your web activity.

2008

ratproxy - Google Code

by kasi77 & 6 others
A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex web 2.0 environments.

ratproxy - Google Code

by webs & 6 others
passive web application security assessment tool

StopBadware.org

by ycc2106 & 4 others
StopBadware.org is a "Neighborhood Watch" campaign aimed at fighting badware. We will seek to provide reliable, objective information about downloadable applications in order to help consumers to make better choices about what they download on to their co

2007

google-caja - Google Code

by greut & 5 others

Using Caja, web apps can safely allow scripts in third party content.

How close is this from Douglas Crockford will of mashup platform?

2006

PUBLIC TAGS related to tag security

blog +   create_image +   icon +   identify +   ip +   online +   story +   visual +  

Active users

decembre
last mark : 02/06/2020 10:34

sbrothier
last mark : 11/07/2014 13:19

François Hodierne
last mark : 06/11/2013 13:29

pkrumins
last mark : 25/05/2011 21:14

brianwaustin
last mark : 14/12/2010 17:32

marco
last mark : 26/05/2010 09:31

Xavier Lacot
last mark : 30/03/2010 12:24

ghis
last mark : 14/01/2010 22:58

kemar
last mark : 23/12/2009 12:02

ycc2106
last mark : 18/11/2009 19:49

julie
last mark : 05/09/2009 08:03

piouPiouM
last mark : 07/02/2009 17:02

Krome
last mark : 10/07/2008 10:03

kasi77
last mark : 09/07/2008 13:14

webs
last mark : 03/07/2008 09:34

greut
last mark : 11/11/2007 15:16

cbrocas
last mark : 05/06/2007 10:54

pallefs
last mark : 15/01/2007 18:13

plasticdreams
last mark : 11/12/2006 04:45