background preloader

CVE security vulnerability database. Security vulnerabilities, exploits, references and more

CVE security vulnerability database. Security vulnerabilities, exploits, references and more
www.cvedetails.com provides an easy to use web interface to CVE vulnerability data. You can browse for vendors, products and versions and view cve entries, vulnerabilities, related to them. You can view statistics about vendors, products and versions of products. CVE details are displayed in a single, easy to use page, see a sample here. CVE vulnerability data are taken from National Vulnerability Database (NVD) xml feeds provided by National Institue of Standards and Technology. Additional data from several sources like exploits from www.exploit-db.com, vendor statements and additional vendor supplied data, Metasploit modules are also published in addition to NVD CVE data.

http://www.cvedetails.com/index.php

5 things you didn't know about ... Apache Maven Maven is an excellent build tool for Java™ developers, and you can use it to manage the life cycle of your projects as well. As a life-cycle management tool, Maven operates against phases rather than Ant-style build "tasks." Maven handles all phases of the project life cycle, including validation, code generation, compilation, testing, packaging, integration testing, verification, installation, deployment, and project site creation and deployment.

news, views and everything robotic Download (PDF, 20B) Background Robots are an increasingly common sight in U.S. police departments. These unmanned ground vehicles are used for roles that are deemed too hazardous for law enforcement officers, such as inspecting and disarming explosive ordnance. The influx of robots into civilian law enforcement agencies follows the widespread integration of unmanned vehicles into the U.S. military, where they have played an important role—particularly in explosive ordnance disposal operations—in Iraq and Afghanistan.

IT Security Database. OVAL patch, vulnerability, compliance definitions data source This site collects OVAL(Open Vulnerability and Assessment Language) definitions from several sources like Mitre, Red Hat, Suse, NVD, Apache etc and provides a unified, easy to use web interface to all IT security related items including patches, vulnerabilities and compliance checklists. You can view full details of oval definitions, which is not possible at any other public web site. Other similar web sites just display comments about the definitions but here you can view exactly what you should look for to verify a vulnerability or a patch. Without itsecdb.com it is almost impossible to view details of an OVAL definition without getting lost in several xml files, definition documentation, xml schemas etc. itsecdb is fully integrated to www.cvedetails.com so you can easily navigate between CVE, product and oval definition details.

Quick VPN - A Best And Free Android VPN App ~ Tech Senser With the increased number of hackers, it has surely become way much compulsory for everyone to go with a VPN service, especially when using a public network. Public networks or Internets are known to be the most insecure internet connections, as you are more prone to get hacked or intruded by any of the hackers that are on public networks and are looking for easy target. These hackers don’t even spare people with iPhone and Android devices, and they also intend to steal the data from these devices too so that they can later use them for their own purposes.

Consortium - How Shibboleth Works At its core Shibboleth works the same as every other web-based Single Sign-on (SSO) system. What distinguishes Shibboleth from other products in this field is its adherence to standards and its ability to provide SSO support to services outside of a user's organization while still protecting their privacy. The main elements of a web-based SSO system are: Firefox Web Browser — Getting Started with Mozilla Firefox — mozilla.org Welcome to Firefox! We'll show you all the basics to get you up and running. When you're ready to go beyond the basics, check out the other links for features you can explore later. Choose the page that opens when you start Firefox or click the Home button.

About JimmyR.com Roleplay. Learn to play songs by ear! Free Ear Training.[Video Tutorial] How to build google chrome extensions Optomec launches new 3D printer for metal additive manufacturing Jun.12, 2013 Optomec announced today availability of a new metal 3D Printer named the LENS 450. The LENS 450 is built on the same LENS core technology that is used to repair, coat and rapidly manufacture a wide variety of high performance metal components. LENS deposition systems use the energy from a high-power laser to build up structures one layer at a time directly from powdered metals. The LENS process is housed in a chamber which is purged with argon such that the oxygen level stays below 10 parts per million to ensure there is no impurity pick-up during deposition. The metal powder is fed to the process by Optomec's proprietary powder-feed system, which is able to flow small quantities of powder very precisely.

Website is currently unreachable The Pirate Wheel is an overview of pirate policies as I’ve understood them from talking to pirates across the world. It’s not an authoritative source over any other, but merely my interpretation — which, in pirate spirit, is no more valid than anybody else’s. A problem with old-style policymaking has always been that the political programs have been flat; they have been an unordered heap of opinions, where assemblies and other meetings occasionally reword or replace a section without regard to impact on other sections. In contrast, the Pirate Wheel focuses equally on what the policy is and why the policy is that way, starting with the fundamental change that has happened to society and deriving from there.

Related: