 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Les Tweets pour danielkennedy74 |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "danielkennedy74" (633 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter danielkennedy74[2012-09-20] - 03:49:56 - Great conversation with @StillSecure on the managed services provider's roles responsibilities in PCI/HIPAA compliance. #hctsna[2012-09-19] - 04:29:38 - Off to Vegas to put my head in the Cloud for a few days...(Prepare for conference level tweeting frequency) #HCTSNA[2012-09-13] - 23:09:42 - RT @hdmoore: Random: 50% of F5 BigIPs have SSH open and 10% of those still allow root logins with the widely published SSH private key # ...[2012-08-14] - 22:48:37 - Firewalls Are No Longer a Fait Accompli [regwall]: http://t.co/kPQGBZwD[2012-07-02] - 02:43:03 - ...the cloud era... ...think I just threw up in my mouth a bit...[2012-06-07] - 03:54:19 - The Hosting Cloud Transformation Summit is on the horizon, 9/18-20th in Las Vegas. Time to sign up: http://t.co/IPHPoSM8[2012-05-01] - 07:33:26 - @krypt3ia @Wh1t3Rabbit @jgamblin Leadership in infosec is clearly based on finding, and drawing out the discussion of, DNS vulnerabilities.[2012-04-30] - 17:41:34 - Join the wildcard SSL celebration... - Wonder if that's what they had in mind....[2012-04-25] - 22:26:09 - @steve_tornio And they had security problems (rogue code, privilege escalation, you name it)...didn't stop a crusty old guy from saying it.[2012-04-25] - 22:26:09 - RT @Knubbeh: danielkennedy74 It's safe, it has a 256bit encryption. XSS is garbage #dumbsecexcuses[2012-04-25] - 22:26:09 - RT @gfonseca_: danielkennedy74 Our site is safe, we use SSL #dumbsecexcuses[2012-04-25] - 22:26:09 - This application won't work if it's behind a firewall. #dumbsecexcuses[2012-03-27] - 21:43:50 - Biebian Linux: http://t.co/3KqUdGLu[2012-03-24] - 06:42:42 - Shopping For Zero-Days - http://t.co/1vX6cPsA (by @a_greenberg). Worth a read.[2012-03-08] - 21:00:09 - @attritionorg @sambowne ...I installed something, but if someone else than uses it for a DDoS, well, I didn't execute that command.[2012-03-01] - 10:31:20 - @dakami: OH: We survived 15 million web attacks So, like, someone ran Nikto ten times? - You didn't survive. I see dead ppl, they do..[2012-02-16] - 23:15:56 - MSFT says botnet chief was former antivirus vendor employee http://t.co/Q9ap56tR - Strong the dark side of the force is...[2012-02-13] - 23:46:31 - PCI has created this false dichotomy in application security... http://t.co/A9Ulaw8F - This feels like a 451 tradition at this point.[2012-02-08] - 04:41:27 - Internet of Things? Cloud computing is still repeating on me, hold off a while?[2012-01-19] - 14:30:57 - Looking for shmoocon barcodes. Anyone ready to part with a ticket or two?[2012-01-12] - 03:02:55 - Who Can Take On Cisco? - http://t.co/Xz0yptat[2011-12-20] - 03:14:31 - @andrewsmhay That tweet made me think about firewalls. I don't know why...[2011-12-20] - 03:14:31 - @LauraWalkerKC: The RQ170 Affair: Spoofing, Jamming, and The GBAS - Scot Terban works it out for you https://t.co/u7feQBjH - Who?[2011-12-20] - 03:14:31 - @andrewsmhay I just came up with the Super Next Generation Applicational Stateful Firewall, Sqd. Thus entered into the LOC, patent pending.[2011-12-14] - 02:14:33 - Everything is moving to the cloud, if the criminals can get into the cloud, they can attack many more targets *facepalm*[2011-12-14] - 02:14:33 - What's the return on a DDoS attack for a cybercriminal - Extortion, still going on.[2011-12-02] - 02:51:06 - @krypt3ia That seems like a lot of work. I think I'll continue with my obfuscation technique of being boring during phone calls...[2011-12-01] - 02:17:10 - @451wendy Why's it always got to be white cloud? What's up with that?[2011-11-30] - 05:19:52 - Cisco, Juniper, Check Point, Palo Alto among firms in security contest http://t.co/tTYe769R[2011-11-17] - 23:38:09 - PCI Council, seriously...stop: http://t.co/rEW9kp1h[2011-11-14] - 23:54:58 - Scene: The Amazon soc op looks up from a terminal. SOC Op: It's down. SUIT: What? SOC Op: They've knocked down..The CLOUD #legionscreenplay[2011-11-09] - 02:35:05 - Iran nuclear program concerns?! Do we need to send you guys another free USB thumb drive?[2011-11-09] - 02:35:05 - RT @esizkur: prediction: 5y from now you'll be firewalling off your fridge from the entertainment vlan at home because it's critical in ...[2011-10-27] - 06:11:09 - If you realize you've given personal data to a phishing site, turn off your computer really fast so the data doesn't transfer #KasperskyMoms[2011-10-27] - 06:11:09 - Does your mouse feel hot? Don't open that file, Chinese hackers took over your computer. Reformat your hard drive. #KasperskyMoms[2011-10-27] - 06:11:09 - Before giving anyone a credit card, ask them if they use the PCI. If they do, stay away! #KasperskyMoms #okthatwasrealadvice[2011-10-26] - 03:15:45 - RT @daveshackleford: What would be implemented first? Network controls? User restrictions? Malware controls? Thinking out loud. - Firewall[2011-10-24] - 19:42:48 - Firewall Fight - http://t.co/DeriDPJs[2011-10-21] - 23:25:34 - RT @Forbes: Ranting Goog Engineer Still Employed, Rethinks Amazon Bashing http://t.co/1kmyHqHT - The grand backtrack, the rant was pure.[2011-10-19] - 01:16:02 - DefCon guide to #OccupyWallStreet hand signals http://t.co/MTjqf1eg - I gotz a signal for ya....[2011-10-13] - 02:52:47 - I guess best titled as reflections of an Amazon/Google programmer: http://t.co/4b3Yrzxd[2011-09-29] - 11:16:43 - @marcocoulter @rachelchalmers Eh, I see it more as a variant of Facebook Connect. They'll cont to kill off OpenID but active dir not as sure[2011-09-28] - 15:29:26 - Just referenced the @beaker model of cloud solution characteristics. Must remember to remember not everyone is on Twitter...[2011-09-28] - 15:29:26 - Agile coding doesn't actually mean 'agile'. I mean it's supposed to be, but just like you don't actually get wet doing a waterfall sdlc...[2011-09-28] - 15:29:26 - To that end, I'm developing something called Awesome SDLC. I don't know what will be in it yet (maybe just agile w/o pair programming).[2011-09-28] - 15:29:26 - Or conversely, I will develop the most comprehensive responsive fast development methodology ever seen, but will call it 'shitty SDLC'.[2011-09-27] - 08:48:37 - Cloud Storage a bit of a lonely path at present: http://t.co/r8FdACUn #hcts[2011-09-27] - 08:48:37 - Systems security people are most concerned about in the cloud, in order of concern: Finance, HR, Data-warehouses e-mail, and ERP. #hcts[2011-09-27] - 08:48:37 - Top inhibitors to your cloud project [chart]? It's not security... #hcts http://t.co/7LAD3B0U[2011-09-27] - 08:48:37 - The cloud, like SaaS, outsourcing, and the rest before it, allows for no abdication of responsibility, or 'knowing' for the CIO... #hcts[2011-09-27] - 08:48:37 - The strategic question best answered by rogue users who violate organizational policy is who should we fire next?.[2011-09-27] - 08:48:37 - Guest security experts answer questions about cloud security from @451wendy: #hcts http://t.co/LFqeC5HG
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|