Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
Command Line Login with the OAuth Device Grant
Command Line Login with the OAuth Device Grant
Tutorial: Learn how to log into input limited devices like TVs and terminals using the OAuth 2.0 Device Grant!
·developer.okta.com·
Command Line Login with the OAuth Device Grant
Firewalls and middleboxes can be weaponized for gigantic DDoS attacks
Firewalls and middleboxes can be weaponized for gigantic DDoS attacks
In an award-winning paper today, academics said they discovered a way to abuse the TCP protocol, firewalls, and other network middleboxes to launch giant distributed denial of service (DDoS) attacks against any target on the internet.
·therecord.media·
Firewalls and middleboxes can be weaponized for gigantic DDoS attacks
CrowdSec, the open-source massively multiplayer firewall
CrowdSec, the open-source massively multiplayer firewall
CrowdSec is a collaborative EDR leveraging the crowd power. Analyze behaviors, respond to attacks & share signals across the community. Security should be accessible to everyone. We make it happen. For free. Join our community and let's make the Internet safer, together.
·crowdsec.net·
CrowdSec, the open-source massively multiplayer firewall