uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4246 bookmarks.

Showing top Tags within 15 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   service   product   online   business   uk   tool   company   linux   code   server   system   application   web   list   video   marine   create   data   experience   description   tutorial   explanation   technology   build   blog   article   learn   world   project   boat   download   windows   security   lookup   free   performance   javascript   technical   network   control   beautiful   support   london   tools   course   file   research   purchase   library   programming   image   youtube   example   php   construction   html   opensource   quality   install   community   computer   profile   feature   power   browser   music   platform   mobile   user   process   work   database   share   manage   hardware   professional   buy   industry   internet   dance   advice   installation   developer   3d   search   material   access   customer   camera   travel   test   standard   review   documentation   css   money   engineering   develop   webdesign   engine   device   photography   digital   api   speed   source   program   management   phone   discussion   question   event   client   story   simple   water   marketing   app   content   yacht   setup   package   fast   idea   interface   account   communication   cheap   compare   script   study   market   live   easy   google   resource   operation   startup   monitor   training  


Tag selected: hacking.

Clear all

Showing 15 results.

Looking up hacking tag. Showing 15 results. Clear

My Account - EC-Council iClass

https://iclass.eccouncil.org/my-account/

Saved by uncleflo on January 14th, 2022.

EC-Council’s iClass online learning platform offers the most flexible online training solutions, making it the perfect option for the busy Cybersecurity professional. World Class Training: We select the best real world instructors to teach our live in-person and live online courses to bring you cyber security training programs wherever you are around the globe. Trusted Certifications: EC-Council certifications are a go-to governments and corporations around the world, including the U.S. Department of Defense. Cutting Edge Technology: EC-Council partners with the best technology providers around to bring you lag-free video training and a fully automated robust online cyber range. Mobile Training Options: The STORM is our mobile security toolkit that comes loaded with a custom Kali Linux OS & 100+ open source hacking tools. Add your course to the STORM for a complete mobile learning experience.

iclass ethical hacking platform certified penetration analyze coding investigator recovery security store specialist application engineer cyber course understand instructor training program government solution option flexible experience certification online live corporation technology development administration secure


ISO/IEC 27000 Cyber Security - Wikipedia

https://en.wikipedia.org/wiki/ISO/IEC_27000

Saved by uncleflo on December 17th, 2019.

ISO/IEC 27000 is part of a growing family of ISO/IEC Information Security Management Systems (ISMS) standards, the 'ISO/IEC 27000 series'. ISO/IEC 27000 is an international standard entitled: Information technology — Security techniques — Information security management systems — Overview and vocabulary. The standard was developed by subcommittee 27 (SC27) of the first Joint Technical Committee (JTC1) of the International Organization for Standardization and the International Electrotechnical Commission.[1]

standardization terminology risk certification security define assessment information management recommend standard technical approach organization commission digital assess wikipedia technology technique system overview cyber hacking web online


OWASP Zed Attack Proxy Project

https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

Saved by uncleflo on June 22nd, 2018.

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.

owasp proxy attack hacker hacking automation check pentesting experience application develop test vulnerability scan browser international world popular tool security continuous delivery


FireEye - Solutions for security-conscious organizations

https://www.fireeye.com/

Saved by uncleflo on April 7th, 2018.

FireEye is on the front lines of cyber attacks every day. Our experts' knowledge of the threat landscape provides insights that enable us to build the best technologies in the industry. Using these technologies first-hand on the front lines further equips our product teams with a constant source of feedback. Through this feedback loop we continuously improve our products at a rate and with sophistication unmatched in the industry, creating a unique innovation cycle.

security company profile page website expert knowledge insight technology front secure hacking team support solution organization


freeformatter.com - Free Online Tools For Developers

https://www.freeformatter.com/batch-formatter.html

Saved by uncleflo on February 7th, 2018.

Free Online Tools For Developers. I created this website to help developers by providing them with free online tools. These tools include several formatters, validators, code minifiers, string escapers, encoders and decoders, message digesters, web resources and more. I will add new tools on a regular basis, so be sure to add this site to your bookmarks. If you encounter a bug, I would very much appreciate that you send me an email (freeformatter@gmail.com) that explains the nature of your bug. Please include details like which browser version you're using and the steps to reproduce the bug. Other comments are welcome. Please "+1" and/or "Facebook Like" this site if you thought it was useful.

online tool developer development security hacking cracking website format validator formatter escaper minifier decoder resource minify css js javascript validate minimize escape browser bookmark batch administration


Which characters need to be escaped in Bash? How do we know it?

https://stackoverflow.com/questions/15783701/which-characters-need-to-be-escaped-in-bash-how-do-we-know-it

Saved by uncleflo on February 7th, 2018.

Is there any comprehensive list of characters that need to be escaped in Bash? Can it be checked just with sed? In particular, I was checking whether % needs to be escaped or not. I tried this and worked fine, without escaping %. Does it mean % does not need to be escaped? Was this a good way to check the necessity? And more general: are they the same characters to escape in shell and bash?

question stackoverflow howto technical development list character escape escaping security bash shell script command commandline administration code maintenance hacking


Maltego Clients - There Are Four Types Of Maltego Clients

https://www.paterva.com/web7/buy/maltego-clients.php

Saved by uncleflo on January 27th, 2018.

Maltego eXtra Large is Paterva's new premium solution to visualise large data sets and is suited for people who need to show relationships between up to 1 million pieces of information. Maltego Classic is a commercial version of Maltego which includes access to all Paterva's standard OSINT transforms. Maltego Classic allows users to visualise up to 10 000 pieces of information and the relationships between them. Maltego CE is the community edition of Maltego and is available for free for everyone after a quick registration. It offers the same functionality as Maltego Classic with a few limitations. CaseFile is Paterva's answer to the offline intelligence problem. Combining Maltego's fantastic graph and link analysis functionality this tool allows for analysts to examine links between offline data.

Software system desktop client social hacking cyber security safety online people tool information administration reference technical lookup organization connection society


The Vulnerability Coordination & Bug Bounty Platform

https://www.hackerone.com/

Saved by uncleflo on June 27th, 2017.

Someone has found a potential security issue with your technology. What happens next? Making certain this discovery leads to a positive outcome for everyone involved is crucial. Replacing an antiquated security@ mailbox with the HackerOne platform brings order and control to an otherwise chaotic process. Do you have a vulnerability disclosure policy? How is it implemented? Leverage our platform to ensure that your team has control over the entire process, from initial validation, internal escalation, communication with the hacker, and the timing and messaging surrounding any coordinated disclosure. A consistent coordination process eliminates the opportunity for miscommunication and ensures positive outcomes. Gain unparalleled insight into your security posture with metrics gleaned from around-the-clock security assessments. Monitor your program's stats in real time to effortlessly stay on top of response time, stale issues, pending disclosures, and more. Your Security Development Lifecycle (SDL) will thank you.

security hacking hacker discover replace process income vulnerability crucial discovery issue potential bounty reward finance money platform hire coordination find code site leverage assessment lifecycle disclosure question technical administration


Start your Fortify on Demand Trial

https://saas.hpe.com/signup/try/fortify-on-demand

Saved by uncleflo on December 9th, 2016.

What's included: 15 days to try the Fortify on Demand service at no cost; 2 Assessment units to spend on 2 express scans; 3 types of scans: express mobile, dynamic or static. (sign up using a business email address; dynamic scans won't work with public email domains like Gmail, Yahoo! Mail, etc.); Full scan reports; No contract or credit card required; No downloads or installation;

fortify trial software saas service business scan security helpful administration sql penetration test testing development code check safety hacking prevention tool evidence signup


XSS (Cross Site Scripting) Prevention Cheat Sheet - OWASP

https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet#Output_Encoding_Rules_Summary

Saved by uncleflo on January 20th, 2015.

This article provides a simple positive model for preventing XSS using output escaping/encoding properly. While there are a huge number of XSS attack vectors, following a few simple rules can completely defend against this serious attack. This article does not explore the technical or business impact of XSS. Suffice it to say that it can lead to an attacker gaining the ability to do anything a victim can do through their browser. Both reflected and stored XSS can be addressed by performing the appropriate validation and escaping on the server-side. DOM Based XSS can be addressed with a special subset of rules described in the DOM based XSS Prevention Cheat Sheet. For a cheatsheet on the attack vectors related to XSS, please refer to the XSS Filter Evasion Cheat Sheet. More background on browser security and the various browsers can be found in the Browser Security Handbook.

hacking scripting prevention cheat sheet owasp cross XSS rule guideline properly attack vector explore technical browser business output escape ecode serious security model filter evasion ability impact defend information administration development howto reference


Wireshark · Go Deep.

https://www.wireshark.org/

Saved by uncleflo on November 14th, 2014.

Co-founded by Laura Chappell, inspirational instructor, consultant, and Wireshark expert, provides training, Network Analyst Certification, and resources for all levels of Wireshark users.

security network tools hack hacking software packet communication deep wire shark winpcap win windows analyse training instructor program install opensource code book capture


The Bunker

http://www.thebunker.net/

Saved by uncleflo on November 14th, 2014.

The Bunker is a highly technical, service-led business, delivering Ultra Secure mission critical Cloud solutions to mid-market companies.

security bunker hosting military kent data business hacking archive computer server opensource object storage cloud infrastructure video partner information enable secure ultra technical director manage disk presentation


Lock Picking 101 Guide to Lock Picks Locksmithing Lockpick Sets Lockpicking

http://www.lockpicking101.com/

Saved by uncleflo on July 15th, 2014.

Everyone who uses LockPicking101.com website is in it for the good and doing it together. This is an information site; because information is free this board is intended to be free. Please read over the following rules so we can keep this web site a better place. This forum postings are to be kept clean and professional. This forum exists to educate in a clean manner, to bring lock picking hobbyists and locksmiths together. Our moderators are here to assist in keeping the forum clean, you must also help out.

security howto lock reference hacking tutorial forum lockpicking information guide set locksmith secure professional moderate


Unshredder - Document Reconstruction Software

http://www.unshredder.com/

Saved by uncleflo on September 6th, 2011.

Unshredder is a simple program that unleashes the power of a desktop computer to reduce the time consumed by investigators reconstructing shredded documentary evidence. Until now the only alternative to manual processing was to engage a third party to process the work on computers at their premises. By comparison to external processing of the evidence Unshredder reduces the turnaround time, keeps full control of the investigation in-house and there is less risk of a security risk or loss of the evidence. The original shreds remain unchanged from the process and the integrity of the original is captured electronically to be printed or despatched electronically by wire or disc.

unshredder security software digital hacking hack tools paper scan shredding scanning reconstruction risk management secret inhouse electronic papers pieces evidence


CCC | Startseite

http://www.ccc.de/

Saved by uncleflo on July 7th, 2010.

Der Chaos Computer Club ist die größte europäische Hackervereinigung und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen. Die Aktivitäten des Clubs reichen von technischer Forschung und Erkundung am Rande des Technologieuniversums über Kampagnen, Veranstaltungen, Politikberatung und Publikationen bis zum Betrieb von Anonymisierungsdiensten und Kommunikationsmitteln. Der Club besteht aus einer Reihe dezentraler lokaler Vereine und Gruppen. Diese organisieren regelmäßige Veranstaltungen und Treffen in vielen Städten des deutschsprachigen Raums. Der CCC vermittelt seine Anliegen über vielfältige Publikationswege und sucht stets das Gespräch mit technisch und sozial Interessierten und Gleichgesinnten. Außerdem fordert und fördert er den Spaß am Gerät und lebt damit die Grundsätze der Hackerethik

club community computer culture geek information internet programming security software technology chaos computers hacking


No further bookmarks found.