Create Account | Sign In Browse All Bookmarks

Browse Bookmarks

0(*_*)0
1 to 10 of 24 results Order by recency | popularity
0 ✔ | 1 ♥ draft-ietf-opsawg-tacacs-07 - The TACACS+ Pro...
TACACS+ provides Device Administration for routers, network access servers and other networked computing devices via one or more centralized servers. This document describes the protocol that is used by TACACS+.
networking, security, tacacs, tacacs plus
0 ✔ | 1 ♥ OWASP - Security Principles
best practices, development, owasp, principle...
0 ✔ | 1 ♥ Subgraph - Open Source Security
Developers of open source security software, including Vega, OWASP-ish security scanning tool.
open source, owasp, owasp scanner, security, ...
0 ✔ | 1 ♥ Schneier on Security
blogs, bruce schneier, internet, internet sec...
0 ✔ | 1 ♥ XML Denial of Service Attacks and Defenses
the billion laughs attack ... neat.
billion laughs attack, dot net, exploits, lol...
0 ✔ | 1 ♥ Security Study of Commercially Deployed Singl...
outlines security flaws (many fixed as a result of this study) that call for some diligence on both the part of identity providers and consumers
development, facebook, facebook connect, fede...
0 ✔ | 1 ♥ StartSSLâ„¢ Certificates & Public Key Inf...
free SSL certs?
free, security, ssl, ssl certs, web development
0 ✔ | 1 ♥ OWASP (Open Web Application Security Project)
outlines common web app security vulnerabilities
guides, programming, security, web applicatio...
0 ✔ | 1 ♥ Guide to PHP Security
How to prevent and attack with SQLi.
security, sql
0 ✔ | 1 ♥ The Top 50 Gawker Media Passwords - Digits - WSJ
don't use these passwords ... or anything like them. and if you're trying to hack someone else's account, try these first :)
password strength, passwords, security, web d...
<~~  <~  1 2 3  ~>  ~~>