Ghidra
Numérique Responsable
imthenachoman/How-To-Secure-A-Linux-Server
An evolving how-to guide for securing a Linux server. - imthenachoman/How-To-Secure-A-Linux-Server
Hack-with-Github/Free-Security-eBooks: Free Security and Hacking eBooks
Free Security and Hacking eBooks. Contribute to Hack-with-Github/Free-Security-eBooks development by creating an account on GitHub.
qazbnm456/awesome-web-security: ? A curated list of Web Security materials
🐶 A curated list of Web Security materials and resources. - qazbnm456/awesome-web-security
Guide de mise en conformité de Piwik à destination des éditeurs de sites We
Solutions pour les cookies de mesure d'audience | CNIL
Web Standards: The What, The Why, And The How
Web Standards, and the documentation to support them, provide huge insight into ‘the why’ and ‘the what’ of the world wide web. In this article, we take a look at the history of Web Standards, how to use them in your work and ways you can get involved in making them.
Revoking of certificates
Managing certificates, and rotating them in due time can quickly get out of hand.
Security Engineering - A Guide to Building Dependable Distributed Systems
Security Checklist
A checklist for staying safe on the internet
Essential Reading for the Security Professional
Essential Reading for the Security Professional
How to Run a Quick Accessibility Audit
Run a quick accessibility audit on any website, even if you've never done one before.
12 Open Source Web Security Scanner to Find Vulnerabilities
An interesting report by Symantec reveals, 76% of scanned websites had malware. and if you are using WordPress then in another report by SUCURI shows, more than 70% of scanned websites were infected with one or more vulnerabilities. As a web application owner, how do you ensure your site is protected from online threats? Doesn’t […]
Hack This Site!
A legal and safe web application security educational resource.
Levels - HackThis!!
Want to learn about hacking, hackers and network security. Try our hacking challenges or join our community to discuss the latest software and cracking tools.
OWASP/OWASPWebGoatPHP
A deliberately vulnerable web application for learning web application security. - OWASP/OWASPWebGoatPHP
Website Speed Optimization: How to Do It in 2019
This post is a complete guide on website speed optimization in 2019. It describes best practices and walks you through their implementation.
Web Accessibility | Udacity
site non accessible
Securing Your Site like It’s 1999
Katie Fenn opens the door on our 2018 season by transporting us back to the turn of the century when new lessons were being learned about web security. Those who don’t learn from the past are condemned to repeat it, so fasten up your winter coat and let Katie lead you through some of the darker parts of the forest.
Wiretapping the Secret Service can be easy and fun | Bryan Seely | TEDxKirk
In 2014, Bryan Seely hacked the Secret Service and the FBI, and then turned himself in to alert authorities to the problem. He'll tell you what you can do ab...
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.
Site Check (Website Test) · UITest.com
4 SQL Injection Techniques For Stealing Data
Learn how hackers use SQL injection to obtain data from your servers and what you can do through T-SQL code and server settings to stop them.
Global Accessibility Laws - uMap
No URL found for this tracker ID
Page d'accueil - Access & Use
No URL found for this tracker ID
minimaxir/big-list-of-naughty-strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data. - minimaxir/big-list-of-naughty-strings
Standblog
Tristan Nitot sur la technologie, l'Internet et les libertés numériques
RGPD : se préparer en 6 étapes | CNIL
RGPD: les outils et la méthode de la CNIL pour se préparer
Welcome · Practical Cryptography for Developers
Les notices AcceDe Web | AcceDe Web