 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "ebellis" (385 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter ebellis[2012-09-22] - 05:03:46 - RT @0x00Austin: Fantastic Javascript password strength meter by the @dropbox guys. https://t.co/u6921uIf #dropbox #programming #javascri ...[2012-09-21] - 04:58:37 - Ruby Security Reviewers Guide https://t.co/Krn5SFB4[2012-09-19] - 05:12:11 - RT @RSnake: Finally got around to donating the XSS cheat sheet to @OWASP http://t.co/EI1zI9AK Now everyone can edit/modify at will.[2012-09-15] - 06:48:27 - RT @ModSecurity: GITty-Up! The OWASP ModSecurity Core Rule Set is now on GitHub: https://t.co/fMF8fb1I. Go Forth and Fork![2012-09-14] - 20:47:48 - Getting 1000 people to not click on stuff, that?s a real social engineering task - @451wendy #UNITEDsummit[2012-09-13] - 23:28:50 - Validating Vulnerabilities with Metasploit http://t.co/7omJ5vWy[2012-09-06] - 06:12:36 - A good list of JavaScript data visualization tools http://t.co/QttPmCA0[2012-08-18] - 13:42:25 - RT @sweis: Awesome job for a kernel hacker looking for an early startup: http://t.co/H1IEq10c[2012-08-18] - 13:42:25 - RT @mattjay: Hey Data nerds- Check out this survey of Javascript libs seen over the past 30 days. http://t.co/LnxhOJJ3 Thank @HClO4Burns ...[2012-08-14] - 23:14:37 - RT @jeremiahg: Flash 0day seen in the wild: targets [via Word doc] ActiveX version of Flash Player for Internet Explorer on Windows. h ...[2012-08-09] - 19:24:26 - RT @rybolov: This is trixty: JavaScript LOIC/WebHive with Google Analytics to track who uses it. http://t.co/edEvCMwv[2012-07-26] - 09:58:03 - RT @risk_io: Experiencing intermittent issues with our DNS provider. They are working on the issue. We'll update everyone as the status ...[2012-07-26] - 09:58:03 - RT @zerigo: Our a, b and http://t.co/azVFCw7C nameservers are currently under high load due to a DDOS attack. We are working to solve it.[2012-07-20] - 03:55:56 - RT @tqbf: Adam Langley's Living With HTTPS talk is pretty much the whole cheat sheet for startups looking to do SSL/TLS right: http:// ...[2012-07-20] - 03:55:56 - Twitter is making me very sad already about missing Blackhat this year[2012-07-12] - 23:45:16 - what AppSec can learn from DevOps http://t.co/UTTilV38 - the devops track at OWASP AppSecUSA should be good[2012-07-12] - 23:45:16 - CSRF vulnerability in OAuth 2.0 client implementations http://t.co/LmezAgNj[2012-06-28] - 17:32:16 - any intentionally vulnerable cloud servers out there for testing running something like DVL? perhaps an easily provisioned AMI?[2012-06-27] - 02:03:28 - RT @meeker: Nothing that starts with just add one line of JavaScript to your website ever ends well. -this[2012-06-27] - 02:03:28 - listening to @hdmoore talking to OWASP Austin on The Root Shell Index https://t.co/t4YhAEZY[2012-06-19] - 16:16:39 - RT @curphey: RT @ruby_news: Part 2 of the Techniques to Secure Your Website with Ruby On Rails series. http://t.co/Z2OjCFbV[2012-06-10] - 16:32:09 - IronSpread scripting Excel with Python http://t.co/0O0GJMdJ[2012-06-08] - 14:22:21 - CloudFlare?s Post Mortem http://t.co/7IiUUK2f[2012-06-08] - 14:22:21 - interesting early research on preventing XSS with JSLR http://t.co/jSfGVr3f[2012-06-05] - 01:42:12 - Some interesting updates for sure. RT @DavidAndGoliath: The post-mortem of the cloudflare exploit is a must-read: http://t.co/QQFeWv04[2012-06-02] - 23:13:41 - RT @eastdakota: Post Mortem: Today's CloudFlare Attack; Apparent Google Apps/Gmail Vulnerability; and How to Protect Yourself http://t.c ...[2012-05-25] - 09:29:54 - reading 'Platform Emergence' section of @securosis vulnerability mgmt whitepaper. Suspiciously close to internal thoughts...[2012-05-23] - 01:49:44 - RT @jollyroger1337: Hey Linux, Mac and Windows users: It's ALL vulnerable http://t.co/RCaw4tIR[2012-05-22] - 11:58:00 - RT @tqbf: Regarding DDoS attacks on Chicago city websites, I think I speak for all Chicagoans when I say: We have websites?[2012-05-22] - 11:58:00 - games as captchas http://t.co/qzRthYKV #areyouahuman[2012-05-18] - 00:39:42 - @manicode reminiscing about his days deploying SQL injection as a feature in the 90's. #ISSA[2012-05-16] - 06:35:59 - RT @ryanhuber: @jeremiahg You can pry the firewall away from my DES encrypted, Kensington locked, MD5 loving, Antivirus signature updati ...[2012-05-11] - 23:07:18 - RT @kyanachik: I'm looking for Ruby on Rails developers for permanent and contract positions in Novi, MI for a pharmaceutical company. ...[2012-05-11] - 06:24:20 - DDoS and Elections http://t.co/8fzKtyGc[2012-05-09] - 04:42:42 - any recommendations out there for a geek friendly hosting provider to house honeypots?[2012-05-03] - 20:25:18 - RT @mortman: @RealGeneKim hence the need for CloudAudit and the acceptance of SSAE 16 SOC 1[2012-04-17] - 06:45:10 - RT @risk_io: RT @jimbecher: Thanks @risk_io for the Amazon gift card! I participated in their Roadmap Survey... badda bing, badda boom. ...[2012-04-07] - 03:04:10 - RT @edointeractive: Former @Orbitz Worldwide Vice President Jeff Sippel joins edo as CTO http://t.co/zqOhYO3e @edointeractive #marketing ...[2012-04-06] - 16:57:05 - SQL Injection through HTTP Headers http://t.co/bRHIZZOt[2012-04-06] - 16:57:05 - RT @WeldPond: Dan Geer Application Security Matters, keynote address, OWASP AppSecDC http://t.co/mtuoh5tJ go read this now[2012-04-05] - 23:08:36 - RT @averagesecguy: There's a new firewall analyzer in town, written by yours truly. Introducing Prometheus: http://t.co/8rJXdi8s. Please RT[2012-04-05] - 01:23:34 - RT @jcran: I'm hiring for Metasploit. Set up pentest scenarios hack on metasploit full-time! dm / email (jcran@metasploit) for more info![2012-04-03] - 06:54:38 - RT @curphey: I am looking for a full-time US based Ruby, Rails, iOS, JavaScript developer to work primarily on open source security tools.[2012-04-02] - 09:59:31 - OneOps, TwoOps ? Exploring cloud ops http://t.co/ovDpyAsZ[2012-03-31] - 20:39:42 - RT @risk_io: In case you missed it earlier this week, Risk I/O now integrates with Burp Scanner http://t.co/lEimL5zd[2012-03-29] - 11:44:10 - RT @unixfreaxjp: #Exploit analysis #Tools - Risk I/O: Our Latest Integration - Burp Portswigger http://t.co/OsuY1s3k[2012-03-28] - 17:41:45 - @mckeay agree the language is probably used to provoke, but by that definition all we'll ever need are firewalls and AV.[2012-03-28] - 17:41:45 - botnet available! - http://t.co/3OoAjJ6t[2012-03-27] - 06:54:39 - Risk I/O now integrated with Burp Scanner http://t.co/k0kxKNnx /cc @portswigger[2012-03-27] - 06:54:39 - Microsoft leads raids on big time botnets http://t.co/HP76wpez[2012-03-27] - 06:54:39 - RT @joernchen: Wrote a simple Ruby on Rails scanner for accessible/protected attributes: https://t.co/nSyFjJFj might help to find mass a ...[2012-03-23] - 01:04:25 - RT @jm3: Selling zero-day security exploits to government agencies is a big business. http://t.co/CKq3S1Td -yup!
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|