Numérique Responsable

2978 bookmarks
Custom sorting
Introducing the Sustainable Web Manifesto
Introducing the Sustainable Web Manifesto
Last week we were proud to launch the Sustainable Web Manifesto, a collaborative project that we worked on with a number of our industry peers who share our commitment to sustainability. In this post, I’ll explain the vision behind the project, the process of making it happen, why you should sign it and what we …
·www.wholegraindigital.com·
Introducing the Sustainable Web Manifesto
Tom Greenwood: Zero Carbon WordPress
Tom Greenwood: Zero Carbon WordPress
The internet appears clean on the surface but in fact contributes 300m tonnes of CO2 a year, or 1% of global emissions. WordPress is one of the world’s largest communities of “web creators”, sha…
·wordpress.tv·
Tom Greenwood: Zero Carbon WordPress
yadox666/The-Hackers-Hardware-Toolkit
yadox666/The-Hackers-Hardware-Toolkit
The best hacker's gadgets for Red Team pentesters and security researchers. - yadox666/The-Hackers-Hardware-Toolkit
·github.com·
yadox666/The-Hackers-Hardware-Toolkit
Firefox Monitor
Firefox Monitor
Most people have about 100 online accounts. Have any of yours been exposed in a data breach? Find out.
·monitor.firefox.com·
Firefox Monitor
Defensive Coding Guide
Defensive Coding Guide
Introducing the Defensive Coding Guide The Defensive Coding Guide provides guidelines for improving software security through secure coding. It covers common programming languages and libraries, and focuses on concrete recommendations.
·developers.redhat.com·
Defensive Coding Guide
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets)
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets)
(Heads up before you start reading, this article was written by Ben Bidmead at Delta, formerly known as Sequoia Cyber Solutions, this post is quite old now and so a lot of the stuff here is broken and has been re-posted for completeness). To kick off this series on offensive security techniques, I am going to begin with what I consider to be the most important aspects of pentesting. Passive Recon and OSINT. Now, do not let the word ‘passive’ fool you. This is no light recon; you can uncover vas
·delta.navisec.io·
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets)
So You Want To Be a Pentester?
So You Want To Be a Pentester?
It goes without saying that being a Professional Penetration Tester is one of the “sexier” jobs in InfoSec. I mean, let’s be honest here - who wouldn’t want to break into buildings, and hack companies like Elliot from Mr. Robot, or carry out crazy hacks against banks and casinos like in the Oceans Series, all while doing it legally?
·jhalon.github.io·
So You Want To Be a Pentester?
ARIA - Accessibility | MDN
ARIA - Accessibility | MDN
Accessible Rich Internet Applications (ARIA) is a set of attributes that define ways to make web content and web applications (especially those developed with JavaScript) more accessible to people with disabilities. It supplements HTML so that interactions and widgets commonly used in applications can be passed to Assistive Technologies
·developer.mozilla.org·
ARIA - Accessibility | MDN
Pick a Vulnerability to Learn About
Pick a Vulnerability to Learn About
The best defense against hackers is a well-informed development team. Our interactive exercises can teach your team about today's most common security vulnerabilities. %>
·hacksplaining.com·
Pick a Vulnerability to Learn About
Accessibility inspector - Firefox Developer Tools | MDN
Accessibility inspector - Firefox Developer Tools | MDN
The Accessibility Inspector provides a means to access important information exposed to assistive technologies on the current page via the accessibility tree, allowing you to check what's missing or otherwise needs attention. This article takes you through the main features of the Accessibility Inspector and how to use it.
·developer.mozilla.org·
Accessibility inspector - Firefox Developer Tools | MDN
Havocscope Black Market
Havocscope Black Market
Ranking of market risk and security threats from the global black market. Impact of security threats and risks are based upon public documents.
·havocscope.com·
Havocscope Black Market