This page explains how to remotely access Intel AMT KVM from Linux desktop to power on/off remote server or use KVM to access desktop/console.
Tiens j'ai retrouvé la recette des macarons (faut dérouler y'a eu des bugs pendant) là : https://mamot.fr/@LaurentChemla/763716
et aussi https://pastebin.com/R5u2Wv3Q
Attached: 3 images
Donc. Du pain.
Une fois par semaine (environ) on sort Manuel le levain (liquide donc 50/50 eau et farine) du frigo pour le réveiller et le nourrir.
On ajoute de la farine et de l'eau (de source), on mélange, et on attend un peu (pas trop sinon il essaie de se sauver).
The eslint-scope npm package got compromised recently, stealing npm credentials from your home directory. We started running tabletop exercises: what else wo...
Raccoon is a tool made for reconnaissance and information gathering with an emphasis on simplicity.
It will do everything from fetching DNS records, retrieving WHOIS information, obtaining TLS data, detecting WAF presence and up to threaded dir busting and subdomain enumeration. Every scan outputs to a corresponding file.
WINspect is part of a larger project for auditing different areas of Windows environments.
It focuses on enumerating different parts of a Windows machine to identify security weaknesses
and point to components that need further hardening.
et http://www.dsih.fr/article/3021/directive-nis-la-fin-de-l-innocence.html
(surtout bookmark pour le site DSIH, SI hospitaliers et e-santé)
via https://mastodon.etalab.gouv.fr/@maxauvy/100383705199894460/embed
TIL : il existe une cartographie en Open Data et crowdsourcée des noeuds d'infrastructure critiques (énergie, communications, ...) https://t.co/gnyvEQGoUJ Qu'est-ce qui pourrait mal se passer ?
Coding is fun, especially when your "weapon of choice" is Python! Here's a quick tutorial to help you steer away from the most common mistakes.
An important facet of GDPR compliance is the responsible handling of data breaches. Organizations can align with GDPR requirements dealing with the consequences of data breaches through prevention, timely notification, and satisfactory mitigation.
Google CTF
This repository lists most of the challenges used in the Google CTF 2017. The missing challenges are not ready to be open-sourced, or contain third-party code.
IMPORTANT - The code in the 2017 and 2018 folders has unfixed security vulnerabilities. These are there on purpose, and running these on real production infrastructure is not safe.
Read more about the Google CTF here: https://security.googleblog.com/2017/06/announcing-google-capture-flag-2017.html
Note this is not an official Google product
Cool sites about python3 transition
« L'idôlatrie « occidentale » devant la supposée sagesse indienne (ou de n'importe quelle autre partie de la planète) est juste le miroir inversé de la xénophobie européocentrée. » Ah, fichtre, voilà que je suis d'accord avec un article publié sur le blog de Mediapart, maintenant https://blogs.mediapart.fr/yann-kindo/blog/240814/vandana-shiva-demythifiee
At Mozilla, we closely track threats to users' privacy and security. This is why we've added tracking protection to Firefox and created the Facebook container extension. In today's cartoon intro, ...
In these tcpdump examples you will find 22 tactical commands to zero in on the key packets. Know your network with this powerful packet capture tool. Examples for http, icmp, dns, snmp and more.
Avec explications de techniques de parallélisation en shell
Free Programming Books on Android development, C, C#, CSS, HTML5, iOS development, Java, JavaScript, PowerShell, PHP, Python, SQL Sever and more