secure

  • Bookmarks for 22 Apr 2016 through 23 Apr 2016

    These are my links for 22 Apr 2016 through 23 Apr 2016: How to use Powershell in an exploit · rapid7/metasploit-framework Wiki PowerShell is a scripting language developed by Microsoft. It provides API access to almost everything in a Windows platform, less detectable by countermeasures, easy to learn, therefore it is incredibly powerful for penetration…

  • Bookmarks for 24 mar 2015 through 29 mar 2015

    These are my links for 24 mar 2015 through 29 mar 2015: Candlepin – Home – Candlepin is a collection of tools which allow companies to manage software subscriptions. The subscriptions allow users to access provided content over secure connections. Rockhopper VPN: IPsec/IKEv2-based VPN software for Linux, implemented in user space. – Rockhopper VPN is…

  • Bookmarks for 2 dic 2014 through 3 dic 2014

    These are my links for 2 dic 2014 through 3 dic 2014: VPN over SSH – ArchWiki – There are several ways to set up a Virtual Private Network through SSH. Note that, while this may be useful from time to time, it may not be a full replacement for a regular VPN. Simplify Your…

  • Bookmarks for 23 gen 2014 from 12:32 to 13:23

    These are my links for 23 gen 2014 from 12:32 to 13:23: Homepage – A collection of task oriented solutions in Puppet Ori File System – Ori is a distributed file system built for offline operation and empowers the user with control over synchronization operations and conflict resolution. We provide history through light weight snapshots…

  • Bookmarks for 2 ott 2013 through 22 ott 2013

    These are my links for 2 ott 2013 through 22 ott 2013: Digital Attack Map – Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google Ideas and Arbor Networks. The tool surfaces anonymous attack traffic data to let users explore historic trends and find…