Chercher :
Newsletter :  


Revues :
- Presse
- Presse FR
- Vidéos
- Twitter
- Secuobs





Sommaires :
- Tendances
- Failles
- Virus
- Concours
- Reportages
- Acteurs
- Outils
- Breves
- Infrastructures
- Livres
- Tutoriels
- Interviews
- Podcasts
- Communiques
- USBsploit
- Commentaires


Revue Presse:
- Tous
- Francophone
- Par mot clé
- Par site
- Le tagwall


Top bi-hebdo:
- Ensemble
- Articles
- Revue
- Videos
- Twitter
- Auteurs


Articles :
- Par mot clé
- Par auteur
- Par organisme
- Le tagwall


Videos :
- Toutes
- Par mot clé
- Par site
- Le tagwall


Twitter :
- Tous
- Par mot clé
- Par compte
- Le tagwall


Commentaires :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS/XML :
- Articles
- Commentaires
- Revue
- Revue FR
- Videos
- Twitter


RSS SecuObs :
- sécurité
- exploit
- windows
- attaque
- outil
- réseau


RSS Revue :
- security
- microsoft
- windows
- hacker
- attack
- network


RSS Videos :
- curit
- security
- biomet
- metasploit
- biometric
- cking


RSS Twitter :
- security
- linux
- botnet
- attack
- metasploit
- cisco


RSS Comments :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS OPML :
- Français
- International











Revue de presse francophone :
- Diebold et la Banque Internationale à Luxembourg lancent le retrait d'argent à partir du téléphone mobile et sans carte bancaire
- La certification de sécurité des réseaux intelligents en Europe défis et recommandations
- Vigilance - Qemu corruption de mémoire via cirrus, analysé le 04 12 2014
- 272 - Mon ebanking a une faille de sécurité dois-je paniquer
- Vigilance - WordPress Cart66 Lite injection SQL, analysé le 04 12 2014
- 10 mars F5 Forum Paris 2015
- Anti-fraude Dhimyotis lance la Carte ID 2D-Origin
- Fabrice Coquio, président d'Interxion France Internet des Objets, tous les data centers pourront-ils répondre à l'ensemble des défis
- Exclusive Networks Group rachète ITEC
- Vigilance - procmail buffer overflow de getlline, analysé le 04 12 2014
- Steven Commander, HID Global Les bonnes pratiques d'identification sécurisée pour accéder au cloud, aux données et locaux
- Nouvelles solutions IRM chez GlobalSign
- Vigilance - Drupal Hierarchical Select Cross Site Scripting, analysé le 04 12 2014
- Vigilance - Drupal Webform Invitation Cross Site Scripting, analysé le 04 12 2014
- Vigilance - Fine Free file deux vulnérabilités de ELF, analysé le 16 12 2014

Dernier articles de SecuObs :
- Renaud Bidou (Deny All): "L'innovation dans le domaine des WAFs s'oriente vers plus de bon sens et d'intelligence, plus de flexibilité et plus d'ergonomie"
- Mises à jour en perspective pour le système Vigik
- Les russes ont-ils pwn le système AEGIS ?
- Le ministère de l'intérieur censure une conférence au Canada
- Saut d'air gap, audit de firmware et (in)sécurité mobile au programme de Cansecwest 2014
- GCHQ: Le JTRIG torpille Anonymous qui torpille le JTRIG (ou pas)
- #FIC2014: Entrée en territoire inconnu
- Le Sénat investit dans les monnaies virtuelles
- #LPM2013: Un nouvel espoir ?
- L'ANSSI durcit le ton

Revue de presse internationale :
- TRINKET EDC CONTEST ENTRY Lazydoro
- Positive steps on the road towards harmonization of global cybersecurity risk management frameworks
- TechNet Radio MVA Live Event - Part 3 Modernizing Your Data Center TechNet Radio
- NEW PRODUCTS 64 32 RGB LED Matrices 6mm pitch 5mm pitch 3mm pitch
- Friday Squid Blogging Squid Beard
- The unrelenting evolution of Vawtrak
- Cloud development with Azure and Visual Studio Connect Microsoft Visual Studio vNext Azure
- The App That Makes It Incredibly Easy For Hackers To Break Into Your...
- NEW PRODUCT Adafruit PiTFT 2.2 HAT Mini Kit 320 240 2.2 TFT No Touch
- Circuit Playground D is for Diode Adafruit Learning System
- Staples 1.16 million cards possibly vulnerable in data attack
- Staples Provides Update on Data Security Incident 1.6M potentially affected
- Fundamentals of Visual Studio Online 00 Introduction to Visual Studio Online Fundamentals of Visual Studio Online
- Making Scale Mail For a Thorin Oakenshield Costume
- Possible upcoming attempts to disable the Tor network

Annuaire des videos
- FUZZING ON LINE PART THREE
- Official Maltego tutorial 5 Writing your own transforms
- Official Maltego tutorial 6 Integrating with SQL DBs
- Official Maltego tutorial 3 Importing CSVs spreadsheets
- install zeus botnet
- Eloy Magalhaes
- Official Maltego tutorial 1 Google s websites
- Official Maltego tutorial 4 Social Networks
- Blind String SQL Injection
- backdoor linux root from r57 php shell VPS khg crew redc00de
- How To Attaque Pc With Back Track 5 In Arabique
- RSA Todd Schomburg talks about Roundup Ready lines available in 2013
- Nessus Diagnostics Troubleshooting
- Panda Security Vidcast Panda GateDefender Performa Parte 2 de 2
- MultiPyInjector Shellcode Injection

Revue Twitter
- RT @fpalumbo: Cisco consistently leading the way ? buys vCider to boost its distributed cloud vision #CiscoONE
- @mckeay Looks odd... not much to go on (prob some slideshow/vid app under Linux)
- [SuggestedReading] Using the HTML5 Fullscreen API for Phishing Attacks
- RT @BrianHonan: Our problems are not technical but cultural. OWASP top 10 has not changed over the years @joshcorman #RSAC
- RT @mikko: Wow. Apple kernels actually have a function called PE_i_can_has_debugger:
- [Blog Spam] Metasploit and PowerShell payloads
- PinkiePie Strikes Again, Compromises Google Chrome in Pwnium Contest at Hack in the Box: For the second time thi...
- @mikko @fslabs y'all wldn't happen to have lat/long data sets for other botnets, wld you? Doing some research (free/open info rls when done)
- RT @nickhacks: Want to crash a remote host running Snow Leopard? Just use: nmap -P0 -6 --script=targets-ipv6-multicast-mld #wishiwaskidding
- An inexpensive proxy service called is actually a front for #malware distribution -

Mini-Tagwall
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone

+ de mots clés pour la revue de presse

Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit

+ de mots clés pour les videos

Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall

+ de mots clés pour la revue Twitter

Top bi-hebdo des articles de SecuObs
- Le ministère de l'intérieur censure une conférence au Canada
- Mises à jour en perspective pour le système Vigik
- [Ettercap – Partie 2] Ettercap par l'exemple - Man In the Middle et SSL sniffing
- STIX standardise l’échange des informations relatives aux attaques cybernétiques
- [Ettercap – Partie 3] Ettercap par l'exemple - Affaiblissement de protocoles et attaque par injection
- [Infratech - vulnérabilité] Nouvelle version 0.8 de Bluetooth Stack Smasher
- [IDS Snort Windows – Partie 2] Installation et configuration
- GCHQ: Le JTRIG torpille Anonymous qui torpille le JTRIG (ou pas)
- Les russes ont-ils pwn le système AEGIS ?
- WPA Cracker un cluster en ligne de 400 CPU et un dictionnaire de 135 millions d'entrées pour casser, ou pas, WPA/WPA2-PSK en 20 minutes

Top bi-hebdo de la revue de presse
- LampSec CTF4, encore plus vite

Top bi-hebdo de l'annuaire des videos
- Comment creer un server botnet!!!!(Réseau de pc zombies)

Top bi-hebdo de la revue Twitter

Top des articles les plus commentés
- [Metasploit 2.x – Partie 1] Introduction et présentation
- Microsoft !Exploitable un nouvel outil gratuit pour aider les développeurs à évaluer automatiquement les risques
- Webshag, un outil d'audit de serveur web
- Les navigateurs internet, des mini-systèmes d’exploitation hors de contrôle ?
- Yellowsn0w un utilitaire de déblocage SIM pour le firmware 2.2 des Iphone 3G
- CAINE un Live[CD|USB] pour faciliter la recherche légale de preuves numériques de compromission
- Nessus 4.0 placé sous le signe de la performance, de l'unification et de la personnalisation
- [Renforcement des fonctions de sécurité du noyau Linux – Partie 1] Présentation
- [IDS Snort Windows – Partie 1] Introduction aux IDS et à SNORT
- Origami pour forger, analyser et manipuler des fichiers PDF malicieux

Most Entertaining Acceptance Speech

Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS

Menu > Articles de la revue de presse : - l'ensemble [tous | francophone] - par mots clé [tous] - par site [tous] - le tagwall [voir] - Top bi-hebdo de la revue de presse [Voir]

S'abonner au fil RSS global de la revue de presse



Most Entertaining Acceptance Speech

Par Mike Rothman's blog
Le [2009-04-24] à 23:52:27



Présentation : I'm honored, flattered and totally undeserving of winning the "Most Entertaining" blog award at the Social Security Awards at RSA this year. Given I was late to the event (and Rich had to spoil the surprise by sending me a 911 text to get my behind to the Blogger meet-up), and Alan got a bit long in the tooth in giving out the awards, and my total shock at winning much of anything - I was a little at a loss for words. Which is the first time I can remember that happened. And even if I was my usual loudmouth self, the looks from the folks at the party made it clear I was the only thing standing between them and another cocktail. That's a bad place to be, so I kept my comments intentionally short. []I didn't get a chance to say thanks to a lot of folks that made this possible. However undeserving I am, the people around me enable this. So let me send thanks to: 1. The Boss - Yes, without the Boss to keep me honest and focused, none of this happens. She takes care of many things, so I can do what I do. And she supports me and loves me, even when I make that hard to do. I also know that she'll kick my ass if I don't thank her first. Every time someone gets up at an awards show and forgets to thank their spouse, she goes on a tirade. I won't make that mistake. 2. The munchkins - Though I don't view what I do as very entertaining, my kids sure are. So thanks to Leah, Lindsay and Sam - who give me an infinite amount of material to write about. They also teach me something new every day. It's great to see things from their perspective, which keeps me young (even though I look old). 3. My blogging peeps - Yes, the blogging community is integral to the success of all of us. There are too many to thank individually, so I'll just say thanks to everyone. We challenge each other, give each other a hard time, and make the end product much better. Incite is written by me, but it's clearly a joint production. 4. The bad guys - Everything is relative. Without dark, there is no light. Without bad guys, we don't understand what is good. So we can't do what we do unless they are doing what they do - as objectionable as that is. So we can get mad at "the bad" or we can be thankful that they keep us employed, keep raising the bar and ultimately give us a lot to talk about. 5. You - I've always said that I write for myself and I'm just lucky that other people find (entertainment) value in it. That was true at one time, but not anymore. Many people that came to my panels or the booth specifically to tell me they enjoy the Incite. Many also said they wish I had time to write more. Wow. It's a humbling experience and I coudn't thank those folks enough. You can probably see why I kept my comments at the Blogger meet-up short. I suspect someone would have bounced a cue ball off my head if I rambled on like this at the event. I wasn't quite sure what this blogging thing was about 3 years ago, but I ended up making a whole bunch of very good friends, building a business, and progressing along the road to happiness. After a brief detour, I recognize that continuing to write is very important to me. So that's what I'll do.




AddThis Social Bookmark Widget



Les derniers articles du site "Mike Rothman's blog" :

- Security Incite Contracts a Case of Securosis
- The Pope Visits Security Incite Securosis
- The Daily Incite - 12 28 09 - Meyer's Choice
- The Daily Incite - 12 22 09 - Are we there Yeti
- The Daily Incite - 12 17 09 - Changing my Xmas Tune
- The Daily Incite - 12 11 09 - Starbucks Seat Lottery
- The Daily Incite - 12 09 09 - Plunger Tales
- The Daily Incite - 12 07 09 - Happy, Sad, Repeat
- The Daily Incite - 12 03 09 - Not so GRRRRREEEEAAAAATTTTT
- The Daily Incite - 11 30 09 - Giving Thanks




S'abonner au fil RSS global de la revue de presse

Menu > Articles de la revue de presse : - l'ensemble [tous | francophone] - par mots clé [tous] - par site [tous] - le tagwall [voir] - Top bi-hebdo de la revue de presse [Voir]



Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.191.75.173 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.191.75.173 to any 80"
- Nous contacter par mail




SecuToolBox :

Mini-Tagwall des articles publiés sur SecuObs :

Mini-Tagwall de l'annuaire video :

Mini-Tagwall des articles de la revue de presse :

Mini-Tagwall des Tweets de la revue Twitter :