public marks

PUBLIC MARKS with tags tools & security

2017

Privacy Tools

by wabaus & 2 others
Tools for privacy on devices & across the Internet.

2014

NSA uses Google cookies to pinpoint targets for hacking - The Washington Post

by sbrothier (via)
The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using "cookies" and location data to pinpoint targets for government hacking and to bolster surveillance.

2010

Open source anti-theft solution for Mac, PCs & Phones – Prey

by simon_bricolo & 4 others
Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It's lightweight, open source software, and free for anyone to use. And it just works.

2009

Dr.Web ® online check

by ycc2106
Scan your files before downloading them!

Scroogle Scraper

by ycc2106
For Scroogle, SSL is used to hide your search terms. Your IP address is dropped before your search terms are sent to Google. In case of "employer spyware" packages such as Websense. If you use Wi-Fi and you haven't set up your router for secure operation, or in some countries, the government could be monitoring your web activity.

2008

Install and setup Xen on Debian 4.0 Etch — Lone-Wolf Scripts

by camel (via)
Xen is a GPLed virtualization solution available in Debian 4.0 Etch repositories. This article help you to create a coherent Xen installation, with backups and minimum security enhancements. This guide fits my vision of a Xen setup. If it does not fit yours, you are free to adapt it to your needs, or to not use it. For information In this guide, i use the term "virtual host". Be aware that Xen use its own terminology. In a Xen setup, instanciated (aka. started) virtual hosts are called "Domains". Once your computer configured for Xen, all the operating systems run in "domains". The original operating system, where the Xen's control tools are installed, is called "dom0" (for domain No zero). All the guest operating systems are said to be installed in a "domU" (for User domain). As i'm a little lazy (well, yeah... very lazy), i don't want to endure this mind twisting, and i will mainly use the "virtual host" term in this guide. So, if you read this guide, don't by angry at me because of the terms i use.

SORBS (Spam and Open-Relay Blocking System)

by jdrsantos
Fighting spam by finding and listing Exploitable Servers.

SignServer 3.0 - Home

by mbertier (via)
The SignServer is an application framework performing cryptographic operations for other applications. It's intended to be used in environments where keys are supposed to be protected in hardware but there isn't possible to connect such hardware to existing enterprise applications or where the operations are considered extra sensitive so the hardware have to protected more carefully. Another usage is to provide a simplified method to provide signatures in different application managed from one location in the company.

Welcome to REMO | REMO - Rule Editor for ModSecurity

by mbertier (via)
This is a project to build a graphical rule editor for ModSecurity with a positive/whitelist approach.

2007

metro: Discover Metro

by holyver
What is Metro? Metro is a high-performance, extensible, easy-to-use web service stack. It is a one-stop shop for all your web service needs, from the simplest hello world web service to reliable, secured, and transacted web service that involves .NET services. The Metro web service stack is a part of the GlassFish community, but it can be also used outside GlassFish.

PHPIDS » Web Application Security 2.0 » Index

by mbertier & 1 other (via)
PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application. The IDS neither strips, sanitizes nor filters any malicious input, it simply recognizes when an attacker tries to break your site and reacts in exactly the way you want it to. Based on a set of approved and heavily tested filter rules any attack is given a numerical impact rating which makes it easy to decide what kind of action should follow the hacking attempt. This could range from simple logging to sending out an emergency mail to the development team, displaying a warning message for the attacker or even ending the user’s session.

GreenSQL - Open Source Database Firewall Solution

by mbertier & 4 others
GreenSQL is an Open Source database firewall used to protect databases from SQL injection attacks. GreenSQL works in a proxy mode and has built in support for MySQL. The logic is based on evaluation of SQL commands using a risk scoring matrix as well as blocking known db administrative commands (DROP, CREATE, etc). GreenSQL is distributed under the GPL license

PUBLIC TAGS related to tag tools

ajax +   delnyc +   geek +   phone +   productivity +   telephone +   telephony +   voip +   wakeup +  

Active users

wabaus
last mark : 04/03/2017 16:49

sbrothier
last mark : 11/07/2014 13:19

kemar
last mark : 02/12/2010 14:02

simon_bricolo
last mark : 27/10/2010 12:16

piouPiouM
last mark : 28/08/2009 13:25

vrossign
last mark : 06/07/2009 12:08

ycc2106
last mark : 23/03/2009 20:15

camel
last mark : 16/11/2008 09:35

fbureau
last mark : 17/07/2008 09:40

krachot
last mark : 10/07/2008 11:40

jdrsantos
last mark : 28/06/2008 13:24

mbertier
last mark : 12/02/2008 10:48

holyver
last mark : 17/12/2007 22:59

gardenclogs
last mark : 26/09/2007 05:01