background preloader

Datomic - Home

Datomic - Home

Download Burp Suite Please choose the edition of Burp Suite that is right for you. Help me choose › "Burp Suite Pro is an unbelievably powerful tool. The scanner is amazingly fast and accurate. Alex Lauerman, FishNet Security "If you test the security of web applications for a living, Burp Suite Pro is an essential weapon you must have in your arsenal." Jack Mannino, CEO, nVisium Security Inc. Read more Success Stories › Burp Suite Pro price held for 2014 It's been a while since we increased the price of Burp Suite Pro. Today, we pledge that we will not increase the USD price of Burp Suite Pro during 2014. Read the full blog entry ›

Home - Elastic BigData Space Hoplon • A simpler way to program the web with Clojure and ClojureScript Website Security with Acunetix Web Vulnerability Scanner | Web Vulnerability Scanner The Apache Cassandra Project Schema for Clojure(Script) Data Shape Declaration and Validation tl;dr: We open-sourced Schema to get many of the benefits of type systems in Clojure with less hassle. In the future, we will use Schema declarations to do awesome things like auto-generate Objective-C classes (take a peek). Join the discussion on Hacker News and tell us what you think One of the touted benefits of functional programming is that it produces easier to understand and more reusable code. The reasoning behind this claim goes as follows: well-written functional code consists of many small pure functions. Since these functions are free of side-effects, you only need to understand a function's input and outputs to understand its behavior. This is a pure function. Now, the author of this function could definitely have written a doc-string for the function, explaining the 'shape' that share-counts and updates ought to have: This is less than ideal for a number of reasons: Don't you really just want static types? Introducing Schema An extensible protocol Schemas are still just data

libevent conancat/mongoose-redis-cache Schema 0.2.0: back with Clojure(Script) data coercion tl;dr: Schema 0.2.0 is here, adding support for data coercion and 5x faster validation. We've also added Schema support in Plumbing and Graph 0.2.0. Join the discussion on Hacker News and let us know what you think. Back in September, Prismatic released the first version of Schema, and we've been blown away by the interest and contributions from the community since. In addition to a variety of small bugfixes, improvements, and a huge performance boost (see the Changelog), version 0.2.0 brings something new to the party: transformations, which provide a way to perform structured manipulation of data using rules cued by Schemas. Why Transformations? One reason we built Schema was to make sure our backend API servers send and receive properly formed data when communicating with our iOS and web clients. Clojure has a much more nuanced system of data types than JSON, and so simple JSON parsing of inputs did not always produce the data we ordered. And the fun doesn't stop at coercion. Coercion

Web vulnerability scanners SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form. This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner, Ncat network connector, and Nping packet manipulator). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews. 20 tools (13) ★★★★★ Burp Suite (#13, Burp Suite is an integrated platform for attacking web applications. Latest release: version 1.4.01 on June 3, 2011 (3 years, 2 months ago). (7) ★★★★ Nikto (#14, (13) ★★★½ w3af (#18, new!)