background preloader

Agence nationale de la sécurité des systèmes d'information

Agence nationale de la sécurité des systèmes d'information

Related:  Cyber-Sécuritéinternet responsable

How Secure Is My Password? Entries are 100% secure and not stored in any way or shared with anyone. Period. As Seen On Creating and maintaining secure passwords can definitely be a hassle. Mo Data Mo Money: Open Source Business Models RedMonk co-founder and analyst Stephen O'Grady recently gave a talk at Open Source Business Conference. He's posted his notes and slides here. In the talk, he emphasized his idea that there are four generations of software companies, and that selling software is becoming harder and harder. O'Grady sees the way forward for open source companies is leveraging data. According to O'Grady, the four generations are: Tour the World's Webcams With the Search Engine for the Internet of Things Matherly was just sending web server requests, but that kind of constant methodological probing makes many administrators uncomfortable. It’s the kind of reconnaissance work that the bad guys as well as the search engines engage in. “They put these things online and you don’t find them on Google. Therefore, you should be able to find them and anybody who does is trying to hack their network,” Matherly says.

Web Spam Database and IP Blacklist Check CleanTalk provides lists of spam active IP/email addresses which were seen by the service in spamming on the websites, and lists of domains that are promoted using spam. Often, many spam bots send out messages disguised as normal and can be very difficult to define what spam is. You can check the IP/email of questionable users in our lists to find out their spam activity. Check of spam activity for IP/email Communiquer avec ses intimes, sa famille, ses amis, ses camarades, ses professeurs  Informations juridiques Conditions d'utilisation : Wikipedia:Text of the GNU Free Documentation License From Wikipedia, the free encyclopedia (Redirected from Wikipedia:Text of the GFDL) Jump to: navigation, search Shortcut: WP:GFDL Version 1.2, November 2002 Copyright (C) 2000,2001,2002 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. 0. PREAMBLE The purpose of this License is to make a manual, textbook, or other functional and useful document 'free' in the sense of freedom: to assure everyone the effective freedom to copy and redistribute it, with or without modifying it, either commercially or noncommercially. Secondarily, this License preserves for the author and publisher a way to get credit for their work, while not being considered responsible for modifications made by others.

The Malware Museum : Free Software : Free Download, Borrow and Streaming software eye favorite 1 comment 1 An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. favoritefavoritefavoritefavoritefavorite ( 1 reviews ) favorite 5 Ex-Google Engineer Says the Company's Software Infrastructure is Obsolete - ReadWriteCloud Yesterday former Google Wave engineer Dhanji R. Prasanna wrote on his blog about why he is leaving the company. It's an interesting look at Google's company culture, but there's also an interesting technical nugget in there. "Google's vaunted scalable software infrastructure is obsolete," Prasanna wrote. He emphasizes that the hardware infrastructure is still state of the art, "But the software stack on top of it is 10 years old, aging and designed for building search engines and crawlers." Prasanna says software like BigTable and MapReduce are "ancient, creaking dinosaurs" compared to open source alternatives like Apache Hadoop.

Cypherpunks 2. Julian Assange, Andy Müller-Maguhn, Jeremie Zimmermann And Jacob Appelbaum [] Description: Part 1: Cyber threats, hacker attacks and laws officially aiming to tackle internet piracy, but in fact infringing people's rights to online privacy. It's an increasingly topical subject - and the world's most famous whistleblower is aiming to get to the heart of it. In the latest edition of his interview program here on RT, Julian Assange gets together with activists from the Cypherpunk movement - Andy Müller-Maguhn, Jeremie Zimmermann, and Jacob Appelbaum. You can't do much online or with your phone without someone, somewhere, knowing what you're doing.

Related:  Système d'information (SI)RESEAUIdentité numérique et E-reputationLa Commission Nationale informatique et libertéSécurité informatiqueLa securité informatiqueSECURITE INFORMATIQUEInstitutions IEService Public / FranceSécurité de l'informationprotection des donnéesCybersecurity 1Sites utilesHacking: Pour commencercybercriminalitéSécuritéRGPD - DPO - RSSIereputation droit oubliSites de référence