uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4246 bookmarks.

Showing top Tags within 11 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   service   product   online   business   uk   tool   company   linux   code   server   system   application   web   list   video   marine   create   data   experience   description   tutorial   explanation   technology   build   blog   article   learn   world   project   boat   download   windows   security   lookup   free   performance   javascript   technical   network   control   beautiful   support   london   tools   course   file   research   purchase   library   programming   image   youtube   example   php   construction   html   opensource   quality   install   community   computer   profile   feature   power   browser   music   platform   mobile   user   process   work   database   share   manage   hardware   professional   buy   industry   internet   dance   advice   installation   developer   3d   search   material   access   customer   camera   travel   test   standard   review   documentation   css   money   engineering   develop   webdesign   engine   device   photography   digital   api   speed   source   program   management   phone   discussion   question   event   client   story   simple   water   marketing   app   yacht   content   setup   package   fast   idea   interface   account   communication   cheap   compare   script   study   market   live   easy   google   resource   operation   startup   monitor   training  


Tag selected: hacker.

Clear all

Showing 11 results.

Looking up hacker tag. Showing 11 results. Clear

Frontpage -- Terms of Service; Didn't Read

https://tosdr.org/

Saved by uncleflo on January 20th, 2022.

“Terms of Service; Didn't Read” (short: ToS;DR) is a young project started in June 2012 to help fix the “biggest lie on the web”: almost no one really reads the terms of service we agree to all the time. Background. The rough idea behind ToS;DR emerged during the 2011 Chaos Communication Camp near Berlin, with people from Unhosted a movement to create web apps that give users control over their valuable user data and privacy. In the summer of 2012, Hugo Roy (@hugoroyd) started the legal analysis and brought the project to life. Since then, more people have joined the team and have contributed through the reviewer community. Ultimately, all the work is transparent and the discussions happen in public. Our work is funded by non-profits organisations and individual donations and gets released as free software and open data. Please bear in mind that the project is still in the early phase and that most data is subject to important changes. More information about our classification. What does “ToS;DR” mean? the name is inspired by internet acronym TL;DR which stands for "Too Long; Didn't Read" and is often used on blogs and emails when a block of text is just really long and that people are too lazy to read the whole stuff. It was intended more as a code name than as a real name. But it seems that people like it (do you?)

tool volunteer hacker lazy privacy freak information laptop fix expec code acronym agree edit transparent developer motivation educator review consortium copyright website rule ethical about data protection collection


Selenium Webdriver with Python: Tutorial with Example

https://www.guru99.com/selenium-python.html

Saved by uncleflo on April 10th, 2021.

Selenium supports Python and thus can be utilized as Selenium WebDriver with Python for testing. You can run Selenium with Python scripts for Firefox, Chrome, IE, etc. on different Operating Systems. Selenium is a tool to test your web application. You can do this in various ways, for instance

selenium python tutorial browse module automation template chrome package explanation encounter framework howto learn development hacker browser simulate test


Mandiant Advantage Threat Intelligence | FireEye

https://www.fireeye.com/mandiant/advantage.html

Saved by uncleflo on April 10th, 2021.

A global network of support experts available 24x7. We offer simple and flexible support programs to maximize the value of your FireEye products and services. The new standard in threat intelligence. Access for our registered Partners to help you be successful with FireEye.
Collateral, deal registration, request for funds, training, enablement, and more. Read our digital magazine providing expert-authored stories, information, unique insights, and advice on cyber security.

comprehensive enable alert api hacker threat attack vulnerability privacy intelligence global financial motivate emerge documentation incident detection advantage information lookup understand insight value product service flexible support program maximize


OWASP Zed Attack Proxy Project

https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

Saved by uncleflo on June 22nd, 2018.

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.

owasp proxy attack hacker hacking automation check pentesting experience application develop test vulnerability scan browser international world popular tool security continuous delivery


Certified Ethical Hacker - Cyber Security Academy

http://www.cybersecurityacademy.com/Certified-Ethical-Hacker.html

Saved by uncleflo on June 30th, 2017.

The Certified Ethical Hacker course through CyberSecurity Academy will help you to stop hackers by learning to think like one. This class immerses students in an interactive environment where they will scan, test, hack, and secure their own systems. CEH candidates will learn how intruders escalate privileges and what steps can be taken to secure a system. Also covered will be Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. All students will leave the class with a detailed plan on conducting vulnerability assessments and penetration tests.

ethical hacker academy intruder course howto learn secure detection popular demand privilege engineer policy create virus plan conduct assessment penetrate vulnerable center


StopTheHacker

https://www.stopthehacker.com/

Saved by uncleflo on June 27th, 2017.

Based in San Francisco, California, StopTheHacker is one of the tech industry’s most respected leaders; a provider of SaaS services focused on cyber warfare in the arenas of web malware, security and reputation protection. StopTheHacker’s Artificial Intelligence and Machine Learning based technology is supported by the National Science Foundation and has won multiple awards since 2009. StopTheHacker has become widely recognized globally, protecting website owners ranging from large multi-nationals to web hosting companies and small business owners, all who are vulnerable to malicious hacker attacks.

reputation website hacker prevention security hack technology industry company support service cyberattack warfare online internet global protect administration prevent preventative saas lookup list analysis web blacklist award


The Vulnerability Coordination & Bug Bounty Platform

https://www.hackerone.com/

Saved by uncleflo on June 27th, 2017.

Someone has found a potential security issue with your technology. What happens next? Making certain this discovery leads to a positive outcome for everyone involved is crucial. Replacing an antiquated security@ mailbox with the HackerOne platform brings order and control to an otherwise chaotic process. Do you have a vulnerability disclosure policy? How is it implemented? Leverage our platform to ensure that your team has control over the entire process, from initial validation, internal escalation, communication with the hacker, and the timing and messaging surrounding any coordinated disclosure. A consistent coordination process eliminates the opportunity for miscommunication and ensures positive outcomes. Gain unparalleled insight into your security posture with metrics gleaned from around-the-clock security assessments. Monitor your program's stats in real time to effortlessly stay on top of response time, stale issues, pending disclosures, and more. Your Security Development Lifecycle (SDL) will thank you.

security hacking hacker discover replace process income vulnerability crucial discovery issue potential bounty reward finance money platform hire coordination find code site leverage assessment lifecycle disclosure question technical administration


Information Security Stackexchange

https://security.stackexchange.com/

Saved by uncleflo on June 27th, 2017.

Q&A for information security professionals. Ask questions and get answers on any and all information security related topics.

information security information security question answer stackexchange problem incident reference lookup technical business hacker hack community solve solution topic professional relate computer server linux windows os operating system site database advice


Diceware passwords now need six random words to thwart hackers

http://arstechnica.com/information-technology/2014/03/diceware-passwords-now-need-six-random-words-to-thwart-hackers/

Saved by uncleflo on October 17th, 2016.

One of the best ways to create a random yet memorable password is to use "Diceware." This involves literally rolling dice and matching the resulting numbers to a list containing 7,776 English words, each identified by a five-digit number. Five Diceware words has long been thought to provide enough security for the average user.

dice password hacker word six generate result number security random article blog description administration online guide


Special Report: U.S. cyberwar strategy stokes fear of blowback | Reuters

http://www.reuters.com/article/2013/05/10/us-usa-cyberweapons-specialreport-idUSBRE9490EL20130510

Saved by uncleflo on September 5th, 2013.

(Reuters) - Even as the U.S. government confronts rival powers over widespread Internet espionage, it has become the biggest buyer in a burgeoning gray market where hackers and security firms sell tools for breaking into computers. The strategy is spurring concern in the technology industry and intelligence community that Washington is in effect encouraging hacking and failing to disclose to software companies and customers the vulnerabilities exploited by the purchased hacks.

special report usa strategy fear blowback market hacker news story cyber warfare monitor department defence spy tool vulnerability research national security agency


None

http://danwalsh.livejournal.com/30084.html

Saved by uncleflo on August 24th, 2013.

When we first designed targeted policy, we defined a domain that allowed users and administrators to login and have the same access privileges they would have had if SELinux was disabled. Similarly, we wanted to allow third party applications to be installed and run without requiring the administrator/user to write special policy rules for these applications. They would just work.

idea application crack security type blog hacker kernel linux selinux break hack rule administrator context fedora


No further bookmarks found.