Guide de protection numérique | Je protège ma vie privée en ligne
Numérique Responsable
Travailleurs sociaux : un kit d’information pour protéger les données de vos publics | CNIL
La dématérialisation des services publics constitue, pour certains usagers, un véritable obstacle à l’accès aux droits et/ou à la réalisation de certaines démarches obligatoires. Les raisons peuvent être multiples : absence de matériel informatique adapté, non-maitrise des outils informatiques… Ces usagers sont donc amenés à se déplacer, lorsqu’ils le peuvent, dans des espaces publics numériques (EPN) ou auprès de guichets sociaux, en vue de solliciter un accompagnement leur permettant de réaliser leurs démarches numériques.
Faut-il HTTPS sur mon site ?
Découvrez si votre site web a besoin de passer à HTTPS.
http://link.oreilly.com/p0u00F0fnS0R0OQMrW0wKd0
WebAIM: The WebAIM Million - An accessibility analysis of the top 1,000,000 home pages
Here are the data brokers quietly buying and selling your personal information
You’ve probably never heard of many of the data firms registered under a new law, but they’ve heard a lot about you. A list, and tips for opting out.
L'Atelier RGPD
L’atelier RGPD est un cours en ligne gratuit qui s’adresse aussi bien aux profils techniques que juridiques et peut être suivi par toute personne curieuse de cette matière ! Inscrivez-vous dès maintenant.
Ghidra
imthenachoman/How-To-Secure-A-Linux-Server
An evolving how-to guide for securing a Linux server. - imthenachoman/How-To-Secure-A-Linux-Server
Hack-with-Github/Free-Security-eBooks: Free Security and Hacking eBooks
Free Security and Hacking eBooks. Contribute to Hack-with-Github/Free-Security-eBooks development by creating an account on GitHub.
qazbnm456/awesome-web-security: ? A curated list of Web Security materials
🐶 A curated list of Web Security materials and resources. - qazbnm456/awesome-web-security
Guide de mise en conformité de Piwik à destination des éditeurs de sites We
Solutions pour les cookies de mesure d'audience | CNIL
Web Standards: The What, The Why, And The How
Web Standards, and the documentation to support them, provide huge insight into ‘the why’ and ‘the what’ of the world wide web. In this article, we take a look at the history of Web Standards, how to use them in your work and ways you can get involved in making them.
Revoking of certificates
Managing certificates, and rotating them in due time can quickly get out of hand.
Security Engineering - A Guide to Building Dependable Distributed Systems
Security Checklist
A checklist for staying safe on the internet
Essential Reading for the Security Professional
Essential Reading for the Security Professional
How to Run a Quick Accessibility Audit
Run a quick accessibility audit on any website, even if you've never done one before.
12 Open Source Web Security Scanner to Find Vulnerabilities
An interesting report by Symantec reveals, 76% of scanned websites had malware. and if you are using WordPress then in another report by SUCURI shows, more than 70% of scanned websites were infected with one or more vulnerabilities. As a web application owner, how do you ensure your site is protected from online threats? Doesn’t […]
Hack This Site!
A legal and safe web application security educational resource.
Levels - HackThis!!
Want to learn about hacking, hackers and network security. Try our hacking challenges or join our community to discuss the latest software and cracking tools.
OWASP/OWASPWebGoatPHP
A deliberately vulnerable web application for learning web application security. - OWASP/OWASPWebGoatPHP
Website Speed Optimization: How to Do It in 2019
This post is a complete guide on website speed optimization in 2019. It describes best practices and walks you through their implementation.
Web Accessibility | Udacity
site non accessible
Securing Your Site like It’s 1999
Katie Fenn opens the door on our 2018 season by transporting us back to the turn of the century when new lessons were being learned about web security. Those who don’t learn from the past are condemned to repeat it, so fasten up your winter coat and let Katie lead you through some of the darker parts of the forest.
Wiretapping the Secret Service can be easy and fun | Bryan Seely | TEDxKirk
In 2014, Bryan Seely hacked the Secret Service and the FBI, and then turned himself in to alert authorities to the problem. He'll tell you what you can do ab...
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.
Site Check (Website Test) · UITest.com
4 SQL Injection Techniques For Stealing Data
Learn how hackers use SQL injection to obtain data from your servers and what you can do through T-SQL code and server settings to stop them.