• Links
  • Lists
  • Tags
  • Login

Links

Add
Oldest Newest URL A-Z URL Z-A Title A-Z Title Z-A Random
https://isc.sans.edu/diary/23361
https://isc.sans.edu/diary/23361
 
passwords pentest security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Online tools // Centre for Nanoscale BioPhotonics
http://cnbp.org.au/online-tools
 
3d printing microscope science
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://isc.sans.edu/diary/23349
https://isc.sans.edu/diary/23349
 
security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://store.turingtumble.com/
https://store.turingtumble.com/

We invent groundbreaking, original toys that fascinate, delight, and educate.

 
games kids
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://aws.amazon.com/blogs/security/introducing-aws-single-sign-on/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awssso&sc_category=AWS_Identity_and_Access_Management&linkId=46975058
https://aws.amazon.com/blogs/security/introducing-aws-single-sign-on/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awssso&sc_category=AWS_Identity_and_Access_Management&linkId=46975058

September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. Today, AWS introduced AWS IAM Identity Center (AWS IAM Identity Center), a service that makes it easy for you to centrally manage IAM Identity […]

 
amazon authentication aws saml security sso
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://isc.sans.edu/api/threatcategory/research
https://isc.sans.edu/api/threatcategory/research
 
sans security threat
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_compare-resource-policies.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=iamresourcebasedpolicies&sc_category=AWS_Identity_and_Access_Management&linkId=46974513
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_compare-resource-policies.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=iamresourcebasedpolicies&sc_category=AWS_Identity_and_Access_Management&linkId=46974513

Define permissions on a resource in order to grant IAM users access to resources in other AWS accounts.

 
amazon aws iam policy security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://aws.amazon.com/blogs/security/addressing-data-residency-with-aws/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=dataresidencywhitepaper&sc_category=AWS_Identity_and_Access_Management&linkId=47676704
https://aws.amazon.com/blogs/security/addressing-data-residency-with-aws/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=dataresidencywhitepaper&sc_category=AWS_Identity_and_Access_Management&linkId=47676704

AWS has released a new whitepaper that has been requested by many AWS customers: AWS Policy Perspectives: Data Residency. Data residency is the requirement that all customer content processed and stored in an IT system must remain within a specific country’s borders, and it is one of the foremost concerns of governments that want to […]

 
amazon aws data policy residency security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_federated-users.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=externallyauthenticatedusersidentityfederation&sc_category=AWS_Identity_and_Access_Management&linkId=46974375
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_federated-users.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=externallyauthenticatedusersidentityfederation&sc_category=AWS_Identity_and_Access_Management&linkId=46974375

Use roles to grant an IAM user access through identity federation (authorization by an external service).

 
amazon aws security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
How to Prepare for AWS’s Move to Its Own Certificate Authority | AWS Securi
https://aws.amazon.com/blogs/security/how-to-prepare-for-aws-move-to-its-own-certificate-authority/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awscertificateauthority&sc_category=AWS_Identity_and_Access_Management&linkId=46957413

  March 24, 2025: We’ve updated this post to remove an example that referenced an old CA. November 18, 2024: This post was updated to reflect the latest certificate authority information for Amazon issued public certificates. July 11, 2019: The service team has resolved an error that caused customers to see a “Certificate Transparency Required” […]

 
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
OpenCensus: A Stats Collection and Distributed Tracing Framework | Google O
https://opensource.googleblog.com/2018/01/opencensus.html?m=1
 
apm google monitoring open source
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
IAM Best Practices - AWS Identity and Access Management
https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awsiambestpractices&sc_category=AWS_Identity_and_Access_Management&linkId=46957150

Follow these best practices for using AWS Identity and Access Management (IAM) to help secure your AWS account and resources.

 
amazon aws process security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Firefly III - A free and open source personal finance manager
https://www.firefly-iii.org/

Firefly III

 
finance open source software
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
10 Australian Sci-Fi Movies You Need To Watch | Gizmodo Australia
https://www.gizmodo.com.au/2018/01/10-australian-sci-fi-movies-you-need-to-watch/

Dive into cutting-edge tech, reviews and the latest trends with the expert team at Gizmodo. Your ultimate source for all things tech.

 
movies
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
How to Review Code You Don't Understand | max-bittker
https://maxbittker.github.io/code-review
 
code review development
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Two New Documents to Help You Navigate Australian Prudential Regulation Aut
https://aws.amazon.com/blogs/security/two-new-documents-to-help-you-navigate-australian-prudential-regulation-authority-apra-requirements/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=APRAdocuments&sc_category=AWS_Identity_and_Access_Management&linkId=46752971
 
amazon aws process security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Locally developing Kubernetes services (without waiting for a deploy)
https://hackernoon.com/locally-developing-kubernetes-services-without-waiting-for-a-deploy-f63995de7b99

At <a href="https://www.datawire.io" target="_blank">Datawire</a>, all of our cloud services are developed and deployed on Kubernetes. When we started developing services, we noticed that getting code changes into Kubernetes was a fairly tedious process. Typically, we had to:

 
development k8s
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Find Training | AWS Training & Certification
https://www.aws.training/training/?sc_channel=sm&sc_campaign=Launch_Campaign&sc_publisher=TWITTER&sc_country=Global&sc_geo=EMEA&sc_outcome=adoption&trk=_TWITTER&sc_content=AWSTrainCert&linkId=46714283
 
amazon training
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Analyze Database Audit Logs for Security and Compliance Using Amazon Redshi
https://aws.amazon.com/blogs/big-data/analyze-database-audit-logs-for-security-and-compliance-using-amazon-redshift-spectrum/?sc_channel=sm&sc_campaign=Big_Data_Blog&sc_publisher=TWITTER&sc_country=Global&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=redshift-spectrum-blog-db-audit-logs-03&sc_category=Amazon_Redshift&linkId=46689077

In this post, we'll demonstrate querying the Amazon Redshift audit data logged in S3 to provide answers to common use cases described preceding.

 
amazon aws security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
The Top 20 Most Viewed AWS IAM Documentation Pages in 2017 | AWS Security B
https://aws.amazon.com/blogs/security/the-top-20-most-viewed-aws-iam-documentation-pages-in-2017/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=top20awsiamdocpagesin2017&sc_category=AWS_Identity_and_Access_Management&linkId=46619339

The following 20 pages were the most viewed AWS Identity and Access Management (IAM) documentation pages in 2017. I have included a brief description with each link to explain what each page covers. Use this list to see what other AWS customers have been viewing and perhaps to pique your own interest in a topic you’ve […]

 
amazon aws process security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
The Top 10 Most Downloaded AWS Security and Compliance Documents in 2017 |
https://aws.amazon.com/blogs/security/the-top-10-most-downloaded-aws-security-and-compliance-documents-in-2017/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=top10downloadeds&cdocuments2017&sc_category=AWS_Identity_and_Access_Management&linkId=46616500

July 24, 2020: The number 9 item in this list, the Auditing Security Checklist, has been replaced by a Cloud Audit Academy course. The following list includes the ten most downloaded AWS security and compliance documents in 2017. Using this list, you can learn about what other AWS customers found most interesting about security and […]

 
amazon aws process security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Git pretty — justin hileman dot info
http://justinhileman.info/article/git-pretty/?utm_content=buffer1e7c3&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
 
development git programming revision
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Darktable 2.4.0 released
https://www.darktable.org/2017/12/darktable-240-released/
 
photography
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
netstat without netstat · Staaldraad
https://staaldraad.github.io/2017/12/20/netstat-without-netstat/

Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.

 
containers docker networking
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
  • ‹
  • 1
  • 2
  • ...
  • 38
  • 39
  • 40
  • ...
  • 44
  • 45
  • ›
Linkace is a project by Woblick.dev | PGMac . Net . AU | PGLinks