Numérique Responsable

3689 bookmarks
Newest
Security Checklist
Security Checklist
A checklist for staying safe on the internet
·hackernewsletter.us1.list-manage.com·
Security Checklist
12 Open Source Web Security Scanner to Find Vulnerabilities
12 Open Source Web Security Scanner to Find Vulnerabilities
An interesting report by Symantec reveals, 76% of scanned websites had malware. and if you are using WordPress then in another report by SUCURI shows, more than 70% of scanned websites were infected with one or more vulnerabilities. As a web application owner, how do you ensure your site is protected from online threats? Doesn’t […]
·geekflare.com·
12 Open Source Web Security Scanner to Find Vulnerabilities
Hack This Site!
Hack This Site!
A legal and safe web application security educational resource.
·hackthissite.org·
Hack This Site!
Levels - HackThis!!
Levels - HackThis!!
Want to learn about hacking, hackers and network security. Try our hacking challenges or join our community to discuss the latest software and cracking tools.
·hackthis.co.uk·
Levels - HackThis!!
OWASP/OWASPWebGoatPHP
OWASP/OWASPWebGoatPHP
A deliberately vulnerable web application for learning web application security. - OWASP/OWASPWebGoatPHP
·github.com·
OWASP/OWASPWebGoatPHP
Securing Your Site like It’s 1999
Securing Your Site like It’s 1999
Katie Fenn opens the door on our 2018 season by transporting us back to the turn of the century when new lessons were being learned about web security. Those who don’t learn from the past are condemned to repeat it, so fasten up your winter coat and let Katie lead you through some of the darker parts of the forest.
·nodeweekly.com·
Securing Your Site like It’s 1999
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.
·ted.com·
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
minimaxir/big-list-of-naughty-strings
minimaxir/big-list-of-naughty-strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data. - minimaxir/big-list-of-naughty-strings
·smashingmagazine.us1.list-manage.com·
minimaxir/big-list-of-naughty-strings
Standblog
Standblog
Tristan Nitot sur la technologie, l'Internet et les libertés numériques
·standblog.org·
Standblog
article-mobile.html
article-mobile.html
Conception numérique responsable. Il est temps de prendre en compte les dimensions sociale et environnementale dès la conception des services numériques.
·greenit.fr·
article-mobile.html