Skip to main content

Home/ Online Tools/ Group items matching "data" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Has my email been hacked? - Lista de sitios comprometidos - 1 views

  •  
    "Top verified data leaks Here we highlight some of largest-volume data leaks in our database and which have already been verified by the attacked site itself or by its community. Each of them has been made publicly available by the attackers themselves or by those affected through different websites. All this information can also be followed by RSS and Twitter."
1More

Stolen Camera Finder - find your photos, find your camera - 2 views

  •  
    Every photo you take with your digital camera contains hidden information about both the image and the camera such as the make, model and date. This information, called exif data, can also include a unique serial number which identifies your camera. This website crawls the internet searching for photos, collecting the serial numbers of the cameras that took them. When you use the drag & drop feature, stolencamerafinder reads the unique serial number from the exif data of your photo and uses it to match against serial numbers it has stored.
1More

VMware backup | Hyper-V backup | Data center backup - 2 views

  •  
    "Vembu BDR Suite for Virtual and Physical Data Centers"
1More

Data Selfie _ Home - 6 views

  •  
    "We want to give you back your Facebook data. data Selfie is a browser extension that tracks you while you are on Facebook to show you your own data traces and reveal how machine learning algorithms use your data to gain insights about your personality."
1More

Vulnerability, CDR and Antivirus APIs | Metadefender - 2 views

  •  
    "Select or drop a file up to 140 MB in size for malware analysis, vulnerability check, and data sanitization (CDR; Content Disarm and Reconstruction)."
1More

IT Security Database. OVAL patch, vulnerability, compliance definitions Data source - 1 views

  •  
    "This site collects OVAL(Open Vulnerability and Assessment Language) definitions from several sources like Mitre, Red Hat, Suse, NVD, Apache etc and provides a unified, easy to use web interface to all IT security related items including patches, vulnerabilities and compliance checklists."
1More

World and regional statistics, national data, maps, rankings - 6 views

  •  
    World Data Atlas. World and regional statistics, national Data, maps, rankings. 370M+timeseries: 960+topics: 900+sources: Take a look at Data coverage matrix by country or topic to see the full picture!
1More

Named Data Networking (NDN) - A Future Internet Architecture - 1 views

  •  
    'The Named Data Networking (NDN) project aims to develop a new Internet architecture that can capitalize on strengths - and address weaknesses - of the Internet's current host-based, point-to-point communication architecture in order to naturally accommodate emerging patterns of communication. By naming Data instead of their locations, NDN transforms Data into a first-class entity. The current Internet secures the Data container. NDN secures the contents, a design choice that decouples trust in Data from trust in hosts, enabling several radically scalable communication mechanisms such as automatic caching to optimize bandwidth.'
1More

Illumio Homepage - 3 views

  •  
    "Illumio delivers adaptive security that works across the largest data centers and cloud computing environments. Our customers gain live visibility, adaptive micro-segmentation, and instant encryption without dependencies on the network or hypervisor, and thus can run on all workloads across all environments."
1More

NewCloudAtlas.org - 8 views

  •  
    'The New Cloud Atlas is a global effort to map each data place that makes up the cloud in an open and accountable way. We have set out to find and map each warehouse data centre, each internet exchange, each connecting cable and switch. Anything of any physical significance in the operation of the cloud should be observed is some way, and recorded for everyone to see and use.'
1More

Free data, statistics, analysis, visualization & sharing - knoema.com - 6 views

  •  
    "Smarter Research With All Statistics In Your Hands"
1More

The No More Ransom Project - 3 views

  •  
    "Ransomware is malware that locks your computer and mobile devices or encrypts your electronic files. When this happens, you can't get to the data unless you pay a ransom. However this is not guaranteed and you should never pay!"
1More

nextcloud.com - 6 views

  •  
    "A safe home for all your data. Access & share your files, calendars, contacts, mail & more from any device, on your terms"
1More

Secure Cloud Storage, Collaboration, Backup and Drive Sync - XXL Box! - 8 views

  •  
    "SAY HELLO TO XXL BOX CLOUD STORAGE Your files - pictures - documents, anywhere! XXL Box breathes new life into secure Cloud Data Storage, Document Sharing, Collaboration and Backup"
1More

Identity Leak Checker - 12 views

  •  
    With the HPI Identity Leak Checker, it is possible to check whether your e-mail address, along with other personal data (e.g. telephone number, date of birth or address), has been made public on the Internet where it can be misused for malicious purposes.
1More

Home | Internet Monitor Dashboard - 14 views

  •  
    "Internet Monitor lets you explore, create, customize, and share dashboards of data visualizations about multiple facets of the Internet."
2More

Freepto 1.0 - 9 views

  •  
    Freepto is a Linux-based operating system on USB stick. This means you can bring it with you and use any computer as it was your own. Also, data you save on the USB stick will always automatically be encrypted (i.e. nobody else will be able to access them).
  •  
    Actually sounds pretty neet...
1More

BrowserLeaks.com - Web Browser Security Checklist for Identity Theft Protection - 2 views

  •  
    "BrowserLeaks.com - It's all about Web Browser Fingerprinting. Here you will find the gallery of web browser security testing tools, that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet."
‹ Previous 21 - 40 of 222 Next › Last »
Showing 20 items per page