uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4246 bookmarks.

Showing top Tags within 188 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   service   product   online   business   uk   tool   company   linux   code   server   system   application   web   list   video   marine   create   data   experience   description   tutorial   explanation   technology   build   blog   article   learn   world   project   boat   download   windows   security   lookup   free   performance   javascript   technical   network   control   beautiful   support   london   tools   course   file   research   purchase   library   programming   image   youtube   example   php   construction   html   opensource   quality   install   community   computer   profile   feature   power   browser   music   platform   mobile   work   user   process   database   share   manage   hardware   professional   buy   industry   internet   dance   advice   installation   developer   3d   search   material   camera   access   customer   travel   test   standard   review   documentation   css   money   engineering   webdesign   engine   develop   device   photography   digital   api   speed   source   program   management   phone   discussion   question   event   client   story   simple   water   marketing   app   content   yacht   setup   package   fast   idea   interface   account   communication   cheap   compare   script   study   market   easy   live   google   resource   operation   startup   monitor   training  


Tag selected: security.

Clear all

Showing 188 results.

Looking up security tag. Showing 188 results. Clear

Why is Ukraine the West's Fault? Featuring John Mearsheimer

https://www.youtube.com/watch?v=JrMiSQAGOS4

Saved by uncleflo on September 4th, 2022.

UnCommon Core: The Causes and Consequences of the Ukraine Crisis. John J. Mearsheimer, the R. Wendell Harrison Distinguished Service Professor in Political Science and Co-director of the Program on International Security Policy at the University of Chicago, assesses the causes of the present Ukraine crisis, the best way to end it, and its consequences for all of the main actors. A key assumption is that in order to come up with the optimum plan for ending the crisis, it is essential to know what caused the crisis. Regarding the all-important question of causes, the key issue is whether Russia or the West bears primary responsibility. Since its founding in 1890, the University of Chicago has been a destination for rigorous inquiry and field-defining research. This transformative academic experience empowers students and scholars to challenge conventional thinking in pursuit of original ideas.

politics analysis ukraine europe crisis service professor political science director program security university fault chicago consequences assess cause plan responsibility feature lecture discussion study why how policy youtube recording watch


VILLAS Decoration | Your favourite magazine about design and architecture is now available in a digital format

https://www.villasdecoration.com/en/

Saved by uncleflo on February 7th, 2022.

VILLAS magazine celebrates the biggest names and accomplishments in architecture, design, decoration and contemporary art. Private tours of exceptional places, interviews with renowned architects and artists, and remarkable interior design inspiration and trends all feature in this digital logbook, which never fails to surprise. The Belgian Nathalie Deboel is making a furore in Belgium and abroad with her stylish interior projects that always manage to capture a luxurious feeling of peace and security. An interview with this talented home-grown designer. What attracts you to the interior design profession? The diversity. I am constantly stimulated by many different facets. The entire editorial team has been abuzz, intent on wrapping up an exceptional issue, one that goes beyond the stereotyped, the systematic, the stale. A magazine that will draw the gasps of our readers and the attention of our advertisers. A creative, brilliant, elegant issue: a scintillating « Collector’s edition » that flaunts luxury in all its facets. Packed full of gift ideas, design concepts, travel and escapism.

soft style warmth original palette louvre luxury paris exceptional inspire shade humble decoration collector passionate elegant premium comfort memorable designer interior impression belgium surprise architecture contemporary art artist trend feature security


Davide Del Vecchio - Cyber Security

http://www.davidedelvecchio.com/

Saved by uncleflo on February 6th, 2022.

The diary of a Cyber Security Officer. Cyber Security, Security Operations Center (SOC), hacking, transparency and digital human rights. This is an alternative model to understand the Information Security maturity level of a medium/large company. This is based just on my experience in companies and therefore it's to be used just as a reference. Salaries are for London based permanent employees. I don't pretend this model to be very accurate but can be used as a starting point to understand the maturity with one simple question: who will lead the information security?

profile security specialist officer operation hacking transparency digital company experience reference salary cyber online network right employee


Subscription pricing for Tidelift's managed open source subscription

https://tidelift.com/subscription/pricing

Saved by uncleflo on January 16th, 2022.

A better way to manage the health and security of your open source software supply chain. The Tidelift Subscription provides the tools, data, and strategies that drive an inclusive and organization-wide approach to improving the health and security of the open source powering your applications. We provide the tools to create, track, and manage catalogs of open source components and the policies that govern them. Get help building a paved path for your organization's developers with useful and actionable data and recommendations. We partner with a large and fast-growing network of open source maintainers, and pay them to keep their code secure and up to date.

support security software supply chain source opensource project manage tool strategy n organizaion catalog component policy development useful data recommendation administration management


My Account - EC-Council iClass

https://iclass.eccouncil.org/my-account/

Saved by uncleflo on January 14th, 2022.

EC-Council’s iClass online learning platform offers the most flexible online training solutions, making it the perfect option for the busy Cybersecurity professional. World Class Training: We select the best real world instructors to teach our live in-person and live online courses to bring you cyber security training programs wherever you are around the globe. Trusted Certifications: EC-Council certifications are a go-to governments and corporations around the world, including the U.S. Department of Defense. Cutting Edge Technology: EC-Council partners with the best technology providers around to bring you lag-free video training and a fully automated robust online cyber range. Mobile Training Options: The STORM is our mobile security toolkit that comes loaded with a custom Kali Linux OS & 100+ open source hacking tools. Add your course to the STORM for a complete mobile learning experience.

iclass ethical hacking platform certified penetration analyze coding investigator recovery security store specialist application engineer cyber course understand instructor training program government solution option flexible experience certification online live corporation technology development administration secure


NHS COVID Pass - NHS

https://covid-status.service.nhsx.nhs.uk/

Saved by uncleflo on January 13th, 2022.

You can now get proof of your coronavirus (COVID-19) vaccination details and test results using the NHS COVID Pass service. If you have full access to the NHS App, and are registered at a GP surgery in England, you can view and download your COVID Pass for places in England and Wales using this service, or for travel abroad. Information: Some countries may ask for a negative COVID-19 test result. Always check the entry requirements for the country you're visiting before you book your travel. There is step by step travel advice on GOV.UK. If you do not have full access to the NHS App, you can still get your COVID Pass for places in England and Wales using this service.

vaccination pass fraud check page proof step details travel advice abroad visit access register entry status risk test england health service information review security personal public nhs country place


Prey: Laptop Tracking & Data security. Find & Protect lost devices.

https://preyproject.com/

Saved by uncleflo on January 12th, 2022.

Knowing where your assets are at any given time is now crucial. Avoid information loss within your remote workforce using Prey’s persistent device tracking & security solution. Prey is trusted by millions of people, businesses, and institutions around the globe. Wipe data and folders remotely on a lost device, retrieve specific documents and salvage pictures, or encrypt your computer at a distance to maintain your privacy while you track it down. Smoothly manage thousands of devices in the enterprise panel, organize your inventory with labels, perform bulk-tasks with ease, and view your device’s information globally. Integrate all devices and operating systems under a single platform. Android, Windows, Ubuntu, Chrome OS, iOS, macOS, laptops, tablets, and mobiles. You name it, we support it.

remote salvage react prey retrieve persistent alarm android device detect tool organize lock efficient user manage asset lost recover find mobile phone computer security tracking track data laptop protect


Vehicle Tracking Station - Delivering Safety and Peace of Mind

http://en.aika168.com/Index.aspx

Saved by uncleflo on May 15th, 2021.

Software to be used with Vehicle tracking. Trackers connect with this website, and upload information in a nicely well presented way

security peace monitor track tracker hardware vehicle transport safety station software information website connection map


Snyk | Developer security | Develop fast. Stay secure.

https://snyk.io/

Saved by uncleflo on May 11th, 2021.

Developer-first Cloud Native Application Security. Loved by both developers and security teams: Find vulnerabilities while you code, with IDE and SCM integrations. Fix quickly and early, with automated remediation and actionable insight. Prevent introducing new vulnerabilities into your code base through new dependencies and code changes. Monitor with reporting and alerts providing visibility of application security posture across development teams. Manage with security and license policies and contextual prioritization defined and customized across the organization

actionable vulnerability fix insecure scanner container securely pricing alerts disclose documentation cloud visibility dependency developer automatically govern compliance coding security secure database license application code proprietary platform learn insight automate privacy infrastructure manage enhance kit howto love webdevelopment online internet


ISO/IEC 27000 Cyber Security - Wikipedia

https://en.wikipedia.org/wiki/ISO/IEC_27000

Saved by uncleflo on December 17th, 2019.

ISO/IEC 27000 is part of a growing family of ISO/IEC Information Security Management Systems (ISMS) standards, the 'ISO/IEC 27000 series'. ISO/IEC 27000 is an international standard entitled: Information technology — Security techniques — Information security management systems — Overview and vocabulary. The standard was developed by subcommittee 27 (SC27) of the first Joint Technical Committee (JTC1) of the International Organization for Standardization and the International Electrotechnical Commission.[1]

standardization terminology risk certification security define assessment information management recommend standard technical approach organization commission digital assess wikipedia technology technique system overview cyber hacking web online


AWS Certified Solutions Architect - Professional

https://aws.amazon.com/certification/certified-solutions-architect-professional/

Saved by uncleflo on July 11th, 2019.

The AWS Certified Solutions Architect – Professional exam is intended for individuals who perform a Solutions Architect–Professional role with one or more years of hands-on experience managing and operating systems on AWS. Build on concepts introduced in Architecting on AWS. Learn how to build complex solutions that incorporate data services, governance, and security on the AWS platform. You will also learn about specialized AWS services, including AWS Direct Connect and AWS Storage Gateway, that support hybrid architecture, and you will learn about best practices for building scalable, elastic, secure, and highly available applications on AWS.

scalable enroll amazon fundamentals validation classroom migration cloud automation framework inventory prepare documentation employer design incorporate risk certified understand introduce certification architect workshop presents execution aws specialize platform security practice elastic architecture manage operation system solution teach


RFC 3986 - Uniform Resource Identifier (URI): Generic Syntax (RFC3986)

http://www.faqs.org/rfcs/rfc3986.html

Saved by uncleflo on June 23rd, 2019.

A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.

internet standard uri character resource specification syntax resolve resolution convert requirement security analysis scheme component guideline consideration perform identifier format quideline rfc


Unicode character property - Wikipedia

https://en.wikipedia.org/wiki/Unicode_character_property

Saved by uncleflo on June 23rd, 2019.

The Unicode Standard assigns character properties to each code point. These properties can be used to handle "characters" (code points) in processes, like in line-breaking, script direction right-to-left or applying controls. Slightly inconsequently, some "character properties" are also defined for code points that have no character assigned, and code points that are labeled like "<not a character>". The character properties are described in Standard Annex #44.

ideograph hyphen glyph code category description reference list property process administration security point assign label shape ascii specify quote character text describe


Wordpress Development - Validating Sanitizing and Escaping User Data

https://codex.wordpress.org/Validating_Sanitizing_and_Escaping_User_Data

Saved by uncleflo on June 18th, 2019.

Your code works, but is it safe? When writing code that will run across hundreds if not thousands of websites, you should be extra cautious of how you handle data coming into WordPress and how it's then presented to the end user. This commonly comes up when building a settings page for your theme, creating and manipulating shortcodes, or saving and rendering extra data associated with a post.

code development render data post website php sanitize validate escape administer caution associate build settings wordpress user input secure security page article information


AWS Marketplace: CentOS 7 (x86_64) - with Updates HVM

https://aws.amazon.com/marketplace/pp/B00O7WM7QW

Saved by uncleflo on May 24th, 2019.

This is the Official CentOS 7 x86_64 HVM image that has been built with a minimal profile, suiteable for use in HVM instance types only. The image contains just enough packages to run within AWS, bring up an SSH Server and allow users to login. Please note that this is the default CentOS-7 image that we recommend everyone uses. It contains packages that are updated at points in time to include critical security updates.

unix recommend minimal server image profile instance critical security official version system package aws amazon howto centos update hvm snapshot development administration contain offical


Can You Fly Drones In London?

https://www.silicon.co.uk/e-regulation/fly-drones-london-158901?inf_by=5c0a1cae671db84c038b507b

Saved by uncleflo on December 20th, 2018.

Drones are big business, and thousands of you would have received your very own for Christmas this year. The plummeting cost of components and the ease of buying remote controlled aircraft off the Internet has skyrocketed the use of consumer drones across the globe. Headlines are made every day, whether that’s new drones at CES, drones almost hitting passenger jets, or drones spying on unassuming victims. The CAA (Civil Aviation Authority) has already prosecuted two drone operators in the UK for breaching safety regulations, with numerous other investigations ongoing. In October, a man was arrested for operating a drone over Manchester City’s football stadium in a match with Tottenham Hotspur.

drone passenger breach safety prosecute operator london britain security story case blog article investigation spy victim caa reading information regulation description fly pilot


Steps to Get SSL Certificate Enabled

https://www.namecheap.com/support/knowledgebase/article.aspx/794/14/how-to-enable-ssl

Saved by uncleflo on December 19th, 2018.

The first step after your purchase, is to enable the SSL certificate. In order to do this, you'll first need to have a CSR code generated on your server by your hosting provider. You may also generate a one yourself by following our guide on generating CSR code.

guide start ssl generate administration website security certificate application howto enable cheap process follow solution instructions


SSL Checker

https://decoder.link/sslchecker

Saved by uncleflo on December 19th, 2018.

Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.

host technical lookup domain name tls ssl port secure check security website tool online link useful administration


AtoS - Trusted partner for your Digital Journey

https://atos.net/en/

Saved by uncleflo on October 23rd, 2018.

As technology continuously disrupts the norms, our clients can rely on us to guide them through a successful digital transformation. At Atos, we embrace this journey, striving to remain the trusted partner that delivers digital empowerment to our clients. Our keywords are digital transformation, innovation and value creation, both for our own company and for our clients. We have cemented our position as the trusted partner for our clients’ digital transformation, with the resources, the scale and the know-how that our clients need. Our management is fully dedicated and committed to helping our Group prepare for the future and ensure value is delivered to clients, shareholders, partners and employees. As a responsible employer and an ethical business partner, Atos’ aspiration is to create shared value for all our customers and other stakeholders. We believe that digital technologies can deliver a fairer and more inclusive world and can help protect our environment for generations to come. Alliances and partnerships with other industry leaders are crucial for us to combine world-class capabilities and provide the most innovative customer-focused offerings.

trust partner digital journey atos aspiration preparation transformation company client keyword industry future cybersecurity security cyber online profile advisor relationship value create


Hping

http://www.hping.org/

Saved by uncleflo on October 23rd, 2018.

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features. While hping was mainly used as a security tool in the past, it can be used in many ways by people that don't care about security to test networks and hosts.

ping commandline tcp ip packet command protocol traceroute channel feature security tool test network host analyse administration infrastructure server computer unix


IxLoad - L4-7 performance testing for multiplay services, application delivery platforms, and network security appliances

https://www.ixiacom.com/products/ixload

Saved by uncleflo on October 23rd, 2018.

Measure the quality of experience of real-time, business-critical applications with converged multiplay service emulations. Problem: Endangered quality of experience. In today’s highly competitive landscape, organizations must meet stringent network quality requirements to deliver the best customer experience. However, a widening array of multimedia applications, and an increasing number of users, is making it harder—and more expensive—than ever to validate converged multiplay services and application delivery platforms. Without a way to properly test these services, customer quality of experience is at risk.

measure quality realtime business critical application emulation simulation problem solution test experience delivery endanger requirement product company profile information reference administration validate cybersecurity security online platform


Cyberflood - Security and Performance Testing for App-Aware Solutions

https://www.spirent.com/Products/Cyberflood

Saved by uncleflo on October 23rd, 2018.

As the world’s highest performing L4-7 testing solution, CyberFlood emulates realistic application traffic while validating your security coverage from enterprise to carrier-grade network capacity. TestCloud, a core component of CyberFlood, has a library of tens of thousands of realistic applications and attack vectors and is regularly updated to ensure load and functional testing with unparalleled scalability, thus providing you with elevated security assurance. Built with teams in mind, whether at enterprises, service providers or network equipment manufacturers, our comprehensive security solutions platform improves testing today, while evolving for the future, so your organization stays ahead of the security curve.

cybersecurity security solution realistic application traffic validate enterprise carrier network capacity library attack online functional scalability assurance provider service platform organization website software administration


OWASP Zed Attack Proxy Project

https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

Saved by uncleflo on June 22nd, 2018.

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.

owasp proxy attack hacker hacking automation check pentesting experience application develop test vulnerability scan browser international world popular tool security continuous delivery


National Insurance: apply for a portable document A1/E101 if self-employed in European Economic Area (CA3837)

https://www.gov.uk/government/publications/national-insurance-application-for-form-e101-if-self-employed-in-european-economic-area-ca3837

Saved by uncleflo on June 15th, 2018.

You or your agent can use the online form service or postal form to apply for form A1/E101 to confirm you remain in the UK National Insurance scheme. Use this form if you’re normally self-employed in the UK and going to work temporarily in another country within the European Economic Area (EEA). This form will enable HM Revenue and Customs (HMRC) to determine which member state’s social security legislation will apply. If you’re a director of your own limited company you should complete forms CA3821 and CA3822.

government uk work abroad form apply confirm national insurance scheme insurance revenue custom security legislation director complete administration limited company


How to manually install the Securly SSL certificate in Chrome

https://support.securly.com/hc/en-us/articles/206081828-How-to-manually-install-the-Securly-SSL-certificate-in-Chrome

Saved by uncleflo on May 30th, 2018.

You would want to install the Securly SSL certificate in your Chrome browser to ensure the best browsing experience. The certificate does not control the level of filtering or what sites are allowed. The certificate will prevent errors on sites that Securly decrypts. Without the certificate, sites like Google.com and Facebook.com will show privacy errors, users will perceive this as the internet being “broken”. To install the Securly SSL certificate manually in Chrome, open ‘chrome://settings’ in your Chrome browser (version 59.0.3071 and above)

install security ssl certificate error localhost howto setup chrome google settings development administrator browser site root administer allow secure article description experience privacy