• Links
  • Lists
  • Tags
  • Login

Links

Add
Oldest Newest URL A-Z URL Z-A Title A-Z Title Z-A Random
Modern magic unlocks Merlin's medieval secrets
https://www.cam.ac.uk/stories/merlin-manuscript-discovered-cambridge
 
books history
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Guide to speaking at tech conferences
https://www.cfpland.com/guides/speaking/
 
conferences speaking
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
checkov
https://www.checkov.io/
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
 
code iac policy scanning security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
What does chezmoi do?
https://www.chezmoi.io/what-does-chezmoi-do/
Manage your dotfiles across multiple machines, securely.
 
dotfiles personalisation
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://www.cia.gov/static/5c875f3ec660e092cf893f60b4a288df/SimpleSabotage.pdf
https://www.cia.gov/static/5c875f3ec660e092cf893f60b4a288df/SimpleSabotage.pdf
 
training
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Free Tools for Cloud Environments | CISA
https://www.cisa.gov/resources-tools/resources/free-tools-cloud-environments
 
free security tools
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
What is Li-Fi? Get the Details on What Might Be the Next Big Thing for the Internet
https://www.cnet.com/home/internet/what-is-li-fi/
 
networking wifi
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Building Recommendation Systems using Python - CodeProject
https://www.codeproject.com/Articles/1251123/Building-Recommendation-Systems-using-Python
For those who code
 
data python recommender systems
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Massive Satori botnet emerges - Security - CRN Australia
https://www.crn.com.au/news/massive-satori-botnet-emerges-479522
 
iot security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://www.crowdstrike.com/wp-content/uploads/2024/08/Channel-File-291-Incident-Root-Cause-Analysis-08.06.2024.pdf
https://www.crowdstrike.com/wp-content/uploads/2024/08/Channel-File-291-Incident-Root-Cause-Analysis-08.06.2024.pdf
 
incident management security technical
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Design flaw has Microsoft Authenticator overwriting MFA accounts
https://www.csoonline.com/article/3480918/design-flaw-has-microsoft-authenticator-overwriting-mfa-accounts-locking-users-out.html
Microsoft stands out from the authenticator crowd by annihilating accounts when new accounts are introduced via QR code. Despite user complaints for years, no fix has been issued, leaving IT experts wondering, ‘Why would you pick Microsoft?’
 
mfa microsoft
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
CVE program faces swift end after DHS fails to renew contract. Leaving security flaw tracking in limbo
https://www.csoonline.com/article/3963190/cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html
After DHS did not renew its funding contract for reasons unspecified, MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would have left security flaw tracking in limbo. CISA stepped in to provide a bridge.
 
cyber management security vulnerability
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://www.cyberciti.biz/faq/configure-ubuntu-pi-hole-for-cloudflare-dns-over-https/amp/?__twitter_impression=true
https://www.cyberciti.biz/faq/configure-ubuntu-pi-hole-for-cloudflare-dns-over-https/amp/?__twitter_impression=true
 
open source privacy security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://www.cyberciti.biz/faq/linux-find-windows-10-oem-product-key-command/amp/?__twitter_impression=true
https://www.cyberciti.biz/faq/linux-find-windows-10-oem-product-key-command/amp/?__twitter_impression=true
 
command line key linux windows
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
How To Set Up SSH Keys With YubiKey as 2FA - nixCraft
https://www.cyberciti.biz/security/how-to-set-up-ssh-keys-with-yubikey-as-two-factor-authentication-u2f-fido2/
 
how-to mfa security ssh
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Scammers impersonating the ASD's ACSC | Cyber.gov.au
https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/email-scammers-impersonating-asds-acsc
Scammers are impersonating the ASD's ACSC sending out phishing emails to the public with the email content suggesting to download a malicious antivirus program.
 
cyber phishing security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Dead Reckoning
https://www.damninteresting.com/dead-reckoning/
The 18th century misadventures of HMS Wager and her reluctant crew
 
history
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
A First Glimpse of the Starlink User Ternimal
https://www.darknavy.org/blog/a_first_glimpse_of_the_starlink_user_ternimal/
 
networking security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
4 Open Source Tools to Add to Your Security Arsenal
https://www.darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal/a/d-id/1340487
 
open source security tools
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
DeepSeek Jailbreak Reveals Its Entire System Prompt
https://www.darkreading.com/application-security/deepseek-jailbreak-system-prompt
 
ai llm vulnerability
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Platform Engineering Is Security Engineering
https://www.darkreading.com/application-security/platform-engineering-is-security-engineering
 
application security cyber engineering platform security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
'Shift Left' Triggers Security Soul Searching
https://www.darkreading.com/application-security/shift-left-pushback-triggers-security-soul-searching
 
cyber development devsecops security tools
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://www.darkreading.com/cybersecurity-operations/implementing-identity-continuity-with-nist-cybersecurity-framework
https://www.darkreading.com/cybersecurity-operations/implementing-identity-continuity-with-nist-cybersecurity-framework
 
identity security
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
NIST Drops Password Complexity Mandatory Reset Rules
https://www.darkreading.com/identity-access-management-security/nist-drops-password-complexity-mandatory-reset-rules
 
cyber passwords security standard
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
  • ‹
  • 1
  • 2
  • ...
  • 31
  • 32
  • 33
  • ...
  • 41
  • 42
  • ›
Linkace is a project by Kovah.de | PGMac . Net . AU | PGLinks