These are my links for 16 Mar 2016 through 24 Mar 2016:
- “Reverse Engineering for Beginners” free book –
- Resolve Hardware Status Alert SEL_FULLNESS | Brian Ragazzi – […] I noticed an alert on two UCS B250M2 hosts in the vSphere Client. The alert Name was “Status of other host hardware objects”. This isn’t helpful. To get more information, you have to navigate to the Hardware Status tab of the host properties. Here I saw more information about the alert. It’s cryptically named “System Board 0 SEL_FULLNESS”. […]
- Network Stack: Cisco ASA Packet Capture – […] The ASA platform has fantastic built-in packet capture capabilities which can come in very handy for troubleshooting issues. I will be demonstrating some of the capabilities using an ASA 5505 running version 9.0(1).Performing a packet capture is done using the capture command from privileged exec mode. […][ Fantastic… I won’t say that ]
- Multistage environments with Ansible – Ross Tuck – Ansible has excellent documentation but one thing I was confused about was the best way to store the configuration for multistage projects: say, different passwords for dev, staging, production. This isn’t really covered in the ansible-examples repo because it’s specific to your project and while the documentation has recommendations, it doesn’t spell it out completely (which I need since I’m an idiot).
These are my links for 30 Dic 2015 through 17 Feb 2016:
- Robtex – We aim to make the fastest and most comprehensive free DNS lookup tool on the Internet
- Try Perl: learn the basics of the Perl language in your browser – Welcome to Try Perl ! The window on your right is an interactive Perl interpreter. You can type Perl statements and watch it run. [ via MD http://braindead.tumblr.com/post/136604576916 ]
- Syncthing – Syncthing replaces proprietary sync and cloud services with something open, trustworthy and decentralized. Your data is your data alone and you deserve to choose where it is stored, if it is shared with some third party and how it's transmitted over the Internet.
- AlessandroZ/LaZagne · GitHub – The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software. At this moment, it supports 22 Programs on Microsoft Windows and 12 on a Linux/Unix-Like OS.
These are my links for 30 mar 2015 through 31 mar 2015:
- 5 easy tips to accelerate SSL – Unhandled expression – SSL is slow. These cryptographic algorithms eat the CPU, there is too much traffic, it is too hard to deploy correctly. SSL is slow. Isn’t it? HELL NO! SSL looks slow, because you did not even try to optimize it! For that matter, I could say that HTTP is too verbose, XML web services are verbose too, and all this traffic makes the website slow. But, SSL can be optimized, as well as everything!
- Cybrary – Free Online IT and Cyber Security Training, Forever! – Cybrary is a free and open source, online information technology (IT) and cyber security training environment for the world. We are dedicated to keeping the world’s IT professionals prepared for this ever changing industry and its technologies. You can learn almost anything IT and security related for free, and you can help others to do the same. Take a look at what you can learn: Systems Administration Network Administration Cyber Security Our free IT training classes include everything from industry certifications such as Certified Ethical Hacker, CISSP and CCNA to advanced niche skill sets like advanced penetration testing and cloud administration. Our training includes instructional lectures, interactive lab demonstrations, exam study guides, white papers, case studies and more. [ via https://delicious.com/farmando]
- Exploit Exercises – exploit-exercises.com provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering, and general cyber security issues. [ via https://delicious.com/farmando ]
These are my links for 22 giu 2014 through 23 giu 2014: