| #!/bin/bash | |
| # | |
| # Requires NMAP, NDIFF and Slackcli | |
| # https://candrholdings.github.io/slack-cli/ | |
| # TARGETS should be set by env variable | |
| # INTERVAL how many seconds to wait between scans | |
| # SLACKTOKEN from here https://api.slack.com/web | |
| TARGETS="scanme.handsonhacking.org" |
Picking the right architecture = Picking the right battles + Managing trade-offs
- Clarify and agree on the scope of the system
- User cases (description of sequences of events that, taken together, lead to a system doing something useful)
- Who is going to use it?
- How are they going to use it?
No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.
Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.
- A Russian translation of this article can be found here, contributed by Timur Demin.
- A Turkish translation can be found here, contributed by agyild.
- There's also this article about VPN services, which is honestly better written (and has more cat pictures!) than my article.
| https://reputation.alienvault.com/reputation.generic.gz | |
| https://reputation.alienvault.com/reputation.generic | |
| https://reputation.alienvault.com/reputation.data | |
| https://reputation.alienvault.com/reputation.snort.gz | |
| https://reputation.alienvault.com/reputation.snort | |
| https://reputation.alienvault.com/reputation.iptables.gz | |
| https://reputation.alienvault.com/reputation.iptables | |
| https://reputation.alienvault.com/reputation.squid.gz | |
| https://reputation.alienvault.com/reputation.squid | |
| https://reputation.alienvault.com/reputation.unix.gz |
| Security Onion | |
| Aug 2014: | |
| ... my purpose for installing this was to: | |
| - learn more about security stuff | |
| - steal the packet captures (pcap) provided so I can replay them using tcpreplay for snort testing, | |
| as it's not so sexy to just test using ICMP ping data or local rules that match anything | |
| see: | |
| http://blog.securityonion.net/ |
The Recommended Reading List is a valuable resource for technical professionals who want to thoroughly explore topics such as multi-core programming, embedded, security, and more. Dozens of industry technologists, corporate fellows, and engineers have helped by suggesting books and reviewing the list.
- Power Management in Mobile Devices - Findlay Shearer - Newnes - 9780750679589
- Thermal and Power Management of Integrated Circuits - Arman Vassighi, Manoj Sachdev - Springer - 9781441938329
| http://d.stavrovski.net/blog/post/how-to-install-and-setup-oracle-java-jdk-in-centos-6 | |
| # rpm | |
| wget --no-cookies \ | |
| --no-check-certificate \ | |
| --header "Cookie: oraclelicense=accept-securebackup-cookie" \ | |
| "http://download.oracle.com/otn-pub/java/jdk/7u55-b13/jdk-7u55-linux-x64.rpm" \ | |
| -O jdk-7-linux-x64.rpm | |
| # ubuntu |
-
What brings you to web development? What's your goal? What's your passion? What wakes you up in the middle of the night?
-
Tell me about common themes you run into working in the UI. How did you address them?
- UX/Design changes?
- What’s difficult, what’s fun?
- Localization
-
What do you do to keep up to date with technology (blogs, conferences, etc)?
- What blogs do you follow?
- If you could master one technology this year, what would it be?