Links
AddWith Firefox 145, we’re rolling out major privacy upgrades that take on browser fingerprinting — a pervasive and hidden tracking technique that lets we
Pocket Flow: Codebase to Tutorial. Contribute to The-Pocket/PocketFlow-Tutorial-Codebase-Knowledge development by creating an account on GitHub.
Dockerized local and offline backing up of PostgresQL with rotation and compression. - efrecon/pgbackup
To learn more, please visit: In this session, we explore how developers can design, develop, deliver, and monitor cloud applications as they take advantage o...
Kubernetes for Prod, Tilt for Dev
SMBC is a daily comic strip about life, philosophy, science, mathematics, and dirty jokes.
OSINT means gathering and interpreting public information to address specific intelligence queries, and the tools here are free.
Forgejo is a self-hosted lightweight software forge. Easy to install and low maintenance, it just does the job.
Who wouldn't want enterprise-level authentication for their own VPN?
Fake image-generating app allowed man to download 1.1TB of Disney-owned data.
Brendan Gregg's homepage: I use this site to share various things, mostly my work with computers, specifically, computer performance analysis and methodology.
Tunneled Reverse Proxy Server with Identity and Access Control and Dashboard UI - fosrl/pangolin
This has been a very long time coming, but finally, after a marathon effort, the brand new Have I Been Pwned website is now live!
Feb last year is when I made the first commit to the public repo for the rebranded service, and we soft-launched the new brand in
OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence (CTI) data and observables.
AWS Security Hub is a service that gives you aggregated visibility into your security and compliance posture across multiple Amazon Web Services (AWS) accounts. By joining Security Hub with Amazon QuickSight—a scalable, serverless, embeddable, machine learning-powered business intelligence (BI) service built for the cloud—your senior leaders and decision-makers can use dashboards to empower data-driven decisions […]
Because the Active Directory security lies in the process and not in expensive tools, our solution is simple: download PingCastle and apply its methodology.
Apps often demand excessive permissions, accessing your contacts, location, and more. Discover why sticking to your browser offers better privacy and control.