Bookmarks tagged with "security"
Page 1 of 2
-
.htaccess: A Helper Script to Easily Block Website Traffic by Country · Jens Oliver Meiert
Whatever the motivation for you to consider this—though after all, there are countries attacking, invading, and occupying other countries (e.g., Russia, Israel) and countries committing genocides (e.g., Israel)—, here’s one streamlined approach to geographic IP blocking via .htaccess
-
IPdeny IP country blocks
IPdeny offers country GEO IP address block downloads free of charge. Our country based IP zone files can be easily used in your applications and web sites to minimize on-line fraud, SPAM, floods and sometimes brute force attacks. IPdeny country IP block files can be used to set-up firewall or packet filter rules to disable specific service access and ports based on a specific country.
-
Home - Distributed Denial of Secrets
We're a 501(c)(3) non-profit in the US that archives and publishes hacked and leaked documents in the public interest.
-
How Secure Is My Password? | Password Strength Checker | Security.org
The #1 Password Strength Tool. Trusted and used by millions.
-
Have I Been Pwned: Pwned Passwords
Pwned Passwords are hundreds of millions of real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they're at much greater risk of being used to take over other accounts.
-
OWASP Top Ten | OWASP Foundation
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.
-
Digitalwave ModSecurity Repository
This is a repository for different Linux distributions, currently for Debian and Ubuntu. The repository contains the necessary packages in pre-compiled binary (and source) format for a WAF (Web Application Firewall).
-
Modsecurity Project
ModSecurity is an open source, cross-platform web application firewall (WAF) module. Known as the “Swiss Army Knife” of WAFs, it enables web application defenders to gain visibility into HTTP(S) traffic and provides a power rules language and API to implement advanced protections.
-
The Insecurity of Debian - unix.foo
In the end, the choice between Debian and Red Hat isn’t just about corporate influence versus community-driven development. It’s also a choice between a system that assumes the best and one that prepares for the worst. Unfortunately in today’s highly connected world, pessimism is a necessity.
-
An introduction to Linux Access Control Lists (ACLs) | Enable Sysadmin
Linux Access Control Lists, or ACLs, can take some getting used to, but they're invaluable for getting a finer-grained control of your Linux filesystem permissions.
Bookmarks
Remember del.icio.us? Remember Ma.gnolia? They were both social bookmarking sites and I used both until they ceased to exist. I now keep my bookmarks on my own site and share them here.
I tend to bookmark interesting websites as I browse the web, so my bookmarks could be thought of as a trail of digital breadcrumbs. The existence of a bookmark here does not indicate any endorsement of the website or service.
Subscribe
Click the link below to subscribe to my Bookmarks feed in your favourite news reader client: