Skip to main content

Home/ Information Security/ Group items tagged a

Rss Feed Group items tagged

Rich Hintz

What a Botnet Looks Like - CSO Online - Security and Risk - 0 views

  • What a Botnet Looks Like
  •  
    Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings
Rich Hintz

Personal Identity Provider (PIP) - Download the Seatbelt - 0 views

  • VeriSign's OpenID SeatBelt Plugin
  •  
    SeatBelt is a Firefox plug-in that assists you when signing in to OpenID sites with your Personal Identity Provider (PIP) URL.
Rich Hintz

SAML Single Sign-On (SSO) Service for Google Apps - Google Apps APIs - Google Code - 0 views

  • SAML Single Sign-On (SSO) Service for Google Apps
  •  
    Google Apps offers a SAML-based Single Sign-On (SSO) service that provides partner companies with control over authorization and authentication of hosted user accounts to access web-based applications like Gmail or Google Calendar
netifera platform

netifera - 0 views

  •  
    netifera is a new modular open source platform for creating network security tools.
Tsudo

OSF DataLossDB | Data Loss News, Statistics, and Research - 0 views

shared by Tsudo on 04 Mar 09 - Cached
  •  
    DataLossDB is a research project aimed at documenting known and reported data loss incidents world-wide.
netifera platform

netifera video the java virtual machine as shellcode - 0 views

  •  
    In this screencast we're going to look at some features we are working on for the next version of netifera. The two main things we're going to demonstrate are geographical visualization and the netifera probe which is a deployable software agent that makes it possible to run all netifera platform tools remotely as easily as running them locally.
Rodolfo Arce

Anonimato en la red con I2P - Hacking Ético - 0 views

  •  
    Alternativa a TOR (onion router)
Select Security  Systems Ltd

Internet Home Security Cameras- 2016 - 6 views

  •  
    Security cameras come many types and have seemingly endless feature options. With so many different kinds of home security cameras available, deciding which one makes sense for your home can be a daunting task.Commonly there are two types of security cameras indoor cameras, and outdoor cameras.Both types of cameras are available as standalone units with monitoring apps or as part of a subscription-based home security monitoring system.
vivektrivedi

Private Cloud Solutions - Exigo Tech - 0 views

  •  
    With Private Cloud solutions from Exigo Tech, you can have a private cloud dedicated to you. We help you realise your business goals and turn cloud strategies into action.
vivektrivedi

Cloud Service Providers In Sydney - 0 views

  •  
    At Exigo Tech, we bring our Cloud expertise in association with Telstra's own Cloud Infrastructure offerings to provide your business a comprehensive package for your cloud requirements.
valuementor

ADHICS Compliance Service & Assessment | UAE | ValueMentor - 0 views

  •  
    ValueMentor is a leading Risk & Compliance service provider in UAE helping companies achieve ADHICS Compliance.
timothy999

Current internet / ISP problems, slowness and attacks - 5 views

I've recently faced the same issue. Having asked Google, I found an interesting and informative article https://www.firesticktricks.com/why-is-my-internet-so-slow.html. It provided me with the poss...

web slow internet isp connection attack

valuementor

Understanding the Growing Concern Around Data Privacy - 0 views

  •  
    Data poisoning is a type of adversarial attack where attackers tamper with the data used to train machine learning models. Unlike prompt injection or evasion attacks, it targets the model before deployment. The attacker adds misleading or harmful data to the training set to change how the model behaves.
valuementor

Adversarial Attacks - Cyber Security Services & Payment Security Services Company - 0 views

  •  
    An adversarial attack happens when someone gives a machine learning model misleading input to fool it. These inputs are referred to as adversarial examples. They look entirely normal to the human eye. But they are specifically designed to mislead the AI.
« First ‹ Previous 81 - 100 of 114 Next ›
Showing 20 items per page