阿里云安全专家,主要负责阿里云云产品安全。
http://www.youtube.com/watch?v=6p7FqSav6Ho http://www.
https://code.google.com/p/collective-intelligence-framework/wiki/ThreatIntelligenceTools ...
http://www.slideshare.net/jasontrost/binary-24851796 https://github.
http://irma.quarkslab.com/
Vulnerability Description: Oracle Forms 10g contains code that does not properly validate user input.
http://www.cnblogs.com/index-html/p/ssl-frontend-hijack.
http://www.ibm.com/developerworks/cn/aix/library/au-sshsecurity/ ...
https://github.com/mvalleavila/Kafka-Storm-ElasticSearch
场景 伴随着信息科技日新月异的发展,信息呈现出爆发式的膨胀,人们获取信息的途径也更加多样、更加便捷,同时对于信息的时效性要求也越来越高。
docker介绍 https://www.docker.io/ 我的需求 此次希望将要发布的app和执行环境进行打包, app使用python django开发。
This is an advisory for TWiki administrators: The debugenableplugins request parameter allows arbitrary Perl code execution.
https://github.com/adamcaudill/Psychson
If your web server is apache ,you can add follow line: php_flag engine off We want disab...
https://www.youtube.com/playlist?list=UUIvytJLrQS3x8lTusvTLaOQ 推荐里面的 Threat Detection via Met...
http://rajaruan.blog.51cto.com/2771737/955479
http://stackoverflow.com/questions/10207423/code-to-analyze-pcap-file http://www.
一直以来都想接触Storm实时计算这块的东西,最近在群里看到上海一哥们罗宝写的Flume+Kafka+Storm的实时日志流系统的搭建文档,自己也跟着整了一遍,之前罗宝的文章中有一些要注意...
http://jasonwilder.com/blog/2013/07/16/centralized-logging-architecture/ In Centralized Loggi...
http://www.elasticsearch.org/videos/
https://www.bro.org/community/brocon2014.html
https://code.google.com/p/kautilya/
The purpose of this post is to provide guidance to Snort users who would like to try out Snort 2.
https://github.com/darkoperator/Meterpreter-Scripts
https://www.google.com/?gws_rd=ssl#q=powershell+adsi
http://technet.microsoft.com/en-us/library/bb457006.
https://www.google.com/?gws_rd=ssl#q=rsat
http://www.irongeek.com/i.php?page=videos/bsideslasvegas2014/mainlist http://www.
http://seclists.org/fulldisclosure/2014/Oct/35 OpenSSH lets you grant SFTP access to users wit...
http://opensoc.github.io/https://www.youtube.com/watch?v=UKgjd4ttg8o http://www.
https://teammentor.net/teamMentor http://www.denimgroup.
https://www.youtube.com/user/ChRiStIaAn008/playlists
http://www.infiniteskills.com/training/learning-computer-forensics.
http://www.forensicswiki.org/wiki/Windows_Application_Compatibility ...
http://zerowine.sourceforge.net/ http://whips.
http://www.riyazwalikar.com/2012/11/cross-site-port-attacks-xspa-part-2.
https://www.youtube.com/playlist?list=UUbbgnifxfH-nqx6z9XQ963Q ...
http://www.infoq.com/cn/presentations/third-party-payment-process-control-system ...
Mass mailing or targeted campaigns that use common files to host or exploit code have been and are a very popular vector of attack.
https://ctf.isis.poly.edu/ https://github.com/ctfs/write-ups/tree/master/csaw-ctf-2014 http://shankaraman.
If you've ever used SSH keys to manage multiple machines, then chances are you've used SSH-agent.
http://drops.wooyun.org/tips/3003 https://github.
http://drops.wooyun.org/tools/1344 http://www.
https://github.com/ikoniaris/kippo-graph
http://2014.appsecusa.org/2014/about/live-streaming/ http://vimeo.
http://vicenteaguileradiaz.com/download/tinfoleak/tinfoleak-1.
IBM recently released patches for three security vulnerabilities affecting various versions of DB2 for Linux, Unix and Windows.
http://www.lastline.com/papers/large-scale-detection.
http://www.rtl-sdr.com/rtl-sdr-tutorial-analyzing-gsm-with-airprobe-and-wireshark/ http://meal.
http://pax.grsecurity.net/docs/