 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Les Tweets pour danphilpott |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "danphilpott" (955 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter danphilpott[2012-10-10] - 04:28:43 - @shitmycsosays Because, obviously, cloud data centers don't exist in reality so they have no environment. Makes perfect sense.[2012-10-05] - 17:44:51 - NIST to host Cloud Computing and Big Data Forum Workshop on January 15-17 http://t.co/SqpQqZXU Not much info available yet[2012-10-02] - 09:23:59 - @JimmyVo @alexhutton Same here. Given my lack of knowledge of Courtot and of PCI-DSS I'll recuse myself.[2012-10-01] - 19:29:24 - RT @rybolov: I'm on the @Akamai blog talking about DDoS attacks over the past 2 weeks. http://t.co/8tRLp954[2012-09-19] - 04:35:52 - RT @manunkind: RT @RSnake: Finally got around to donating the XSS cheat sheet to @OWASP http://t.co/lo13DAtL Now everyone can edit/modif ...[2012-09-08] - 02:37:49 - @JDeLuccia One example, they appear to have been funding OpenSSL to get their cryptographic modules validated.[2012-09-07] - 05:03:24 - I like the specs on the new Amazon Fire HD. Tablet w/ dual band wi-fi for the win. But the hobbled Android it runs makes it a non-starter.[2012-08-16] - 21:21:43 - NIST released ITL Security Bulletin 2012-08 Security Of Bluetooth Systems And Devices: Updated Guide http://t.co/n0JXu7xd (PDF)[2012-08-16] - 21:21:43 - RT @0xcharlie: I got a takedown notice for using copyrighted material in my Blackhat NFC paper. If you're reading that whitepaper, you' ...[2012-08-11] - 20:01:10 - RT @rybolov: This is trixty: JavaScript LOIC/WebHive with Google Analytics to track who uses it. http://t.co/edEvCMwv[2012-08-10] - 18:56:05 - @jeffbarr He's just the right age to either blog about cloud or create a cloud startup.[2012-08-10] - 18:56:05 - RT @cloudsa: Application-Aware Firewalls: You may have heard this term recently and wondered what it meant. When it comes to ... http:// ...[2012-08-02] - 19:37:40 - RT @scottsanchez: Dropbox security != cloud security You are correct but even more correct if you drop the word cloud.[2012-08-02] - 19:37:40 - RT @WeldPond: NSA Career page for DEFCON 20 attendees http://t.co/L5I41kXD[2012-08-02] - 19:37:40 - Bart the Guard VPN ... What's this?[2012-08-01] - 15:57:33 - NIST released draft SP 800-147B BIOS Protection Guidelines for Servers http://t.co/8LFWcWXj[2012-08-01] - 15:57:33 - Looking forward to the Cloud Security Alliance DC Chapter meeting tonight at Clyde's in Reston.[2012-07-31] - 13:10:50 - NIST released draft SP 800-147B BIOS Protection Guidelines for Servers http://t.co/8LFWcWXj[2012-07-26] - 09:22:57 - Excellent reverse engineering/PE reference material from @corkami/@ange4771 http://t.co/ryg3YYb9[2012-07-26] - 09:22:57 - RT @usnistgov: Welcome back #NISTFIPS Participants for a discussion on PIV Card Application and Biometric Specifications [WEBCAST] http: ...[2012-07-20] - 21:50:44 - Feel bad that I'm using Gentoo less and Ubuntu more. I guess making things easy is a selling point even in Linux.[2012-07-19] - 11:51:57 - Is cloud software vaporware by definition?[2012-07-12] - 23:01:14 - NIST released draft SP 800-76-2 Biometric Data Specification for Personal Identity Verification http://t.co/TdtfZgKK[2012-07-12] - 23:01:14 - RT @EGeorgantas: DOD Releases Cloud Computing Strategy; Designates DISA as the Enterprise Cloud Service Broker http://t.co/5DJtQdUj[2012-07-01] - 09:43:24 - NIST released ITL SB June 2012 Cloud Computing: Review of Features, Benefits, Risks Recom. for Implementations http://t.co/q7U8qktI[2012-06-28] - 16:58:32 - RT @securityninja: I've said it before but you should check out @_jtmelton Year of Java Security blog posts http://t.co/FEDuJ4De - +1[2012-06-28] - 16:58:32 - GPS spoofing to control a vehicle (drone), wasn't this the plot of the Bond flick Tomorrow Never Dies? http://t.co/nzsdCB1l[2012-06-27] - 20:56:56 - RT @GeorgeReese: Love the description of enStratus I just heard? We don't care about the public vs. private cloud war, we're just the ar ...[2012-06-23] - 03:23:20 - Anyone have a preferred app for pulling compliance/config info from Windows or Linux?[2012-06-23] - 03:23:20 - @justinelze @jadedsecurity Nessus comes in handy, especially with the compliance checks but its utility is somewhat limited.[2012-06-23] - 03:23:20 - @jadedsecurity Does OSSEC work with SCAP?[2012-06-23] - 03:23:20 - Thinking about ethics of botnet research. Is allowing operation after learning how to shut down worth the risk to victims? Who decides?[2012-06-22] - 13:00:07 - RT @CiscoSecurity: Whitepaper ? Implementation and Design Guide for Cisco TrustSec 2.0: http://t.co/T31FZSnp [178 pages of engineering c ...[2012-06-22] - 13:00:07 - DoD CIO/ESI is looking for a private sector cloud computing guru for a short term detail through IT Exchange Program: http://t.co/K1RxVNhx[2012-06-22] - 13:00:07 - RT @ServerSecurity: If AWS is the WalMart of cloud, is OpenStack the Soviet Union? http://t.co/ukqq9Ds0 - These metaphors, they are mixed[2012-06-19] - 15:48:10 - Washington Post: Small cloud companies struggling to secure federal contracts, certification http://t.co/2KMCUQN3[2012-06-16] - 04:51:09 - RT @mfratto: FYI: Bourne movies are still fun watch. Probably my fav action series. Bourne Again: Sequel Hijinks, action flick for Linux[2012-06-13] - 11:39:32 - RT @mwjcomputing: Weird... just got a May we also suggest window when downloading from Microsoft's download site. It suggested MacOS X?[2012-06-13] - 11:39:32 - NIST released final SP 800-121 Revision 1 Guide to Bluetooth Security http://t.co/GcXrW7cW[2012-06-13] - 11:39:32 - @getwired It isn't very hard to build an XP with USB drivers loaded at boot. Could even do it with NT if I recall correctly.[2012-06-13] - 11:39:32 - RT @spookerlabs: VERY nice explanation-must read RT @B1gGaGa: Nmap NSE Howto: MySQL Auth Bypass | Offensive Coder http://t.co/Kmr4xyxN +1[2012-06-13] - 11:39:32 - @getwired I used to build custom NT/2k/XP installs. Adding new/updated drivers was simple. If BIOS supported USB you could use it.[2012-06-12] - 18:06:43 - @bobblakley If I can talk them into $50k for an interview I went from social engineering to real-life marketing and deserve the job.[2012-05-30] - 12:06:07 - NIST released final SP 800-146 Cloud Computing Synopsis and Recommendations http://t.co/OTpVVxRx[2012-05-24] - 19:30:40 - RT @sambowne: Yahoo leaks its own private key via new Axis Chrome extension | Naked Security http://t.co/Pl2eZ5NN #appsec #megafail[2012-05-24] - 05:03:05 - NIST released SB 2012-05 Guidelines for Improving Security Privacy in Public Cloud Computing http://t.co/5XSFzGtn[2012-05-24] - 05:03:05 - @myrcurial Remembering when Linux folks ridiculed Windows for needing a CD to install. Don't hear anti-bloat/small code base talk lately.[2012-05-22] - 11:36:51 - RT @nmap: Nmap 6 released! http://t.co/Ye29XlyV[2012-05-10] - 12:29:56 - An ISACA/CSA Cloud Market Maturity Survey will be coming up soon. Yes, yes, you should respond when it pops.[2012-05-09] - 19:58:18 - RT @enStratus: Join us today at noon CT for an intro webinar to enterprise cloud management a short demonstration of enStratus. ht ...[2012-04-30] - 17:43:59 - NIST Cloud Computing Forum Workshop V will be held on June 5-7, 2012 http://t.co/F3ovyM9q[2012-04-25] - 08:19:07 - RT @SSecurityUK: Context details cloud data security flaws on 4 CSPs. Remnant data could be seen by other customers. http://t.co/DTqwc3Hj
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|