uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 3394 bookmarks.

Showing top Tags within 173 bookmarks

development   information   howto   guide   reference   administration   website   software   design   solution   linux   business   service   web   online   code   server   uk   tool   application   system   blog   list   data   description   tutorial   article   security   video   technology   company   world   windows   explanation   product   download   free   javascript   network   project   lookup   experience   london   performance   file   library   tools   research   php   programming   html   opensource   example   control   create   support   beautiful   technical   community   build   music   image   computer   learn   dance   share   webdesign   database   browser   mobile   user   internet   feature   hardware   work   platform   css   quality   3d   money   install   search   camera   event   access   course   standard   source   travel   management   manage   test   phone   story   client   api   script   marketing   google   fast   digital   simple   review   developer   communication   question   interface   documentation   usa   app   photography   idea   cheap   content   program   device   youtube   study   startup   advice   account   live   professional   monitor   process   profile   setup   media   market   installation   analysis   resource   flash   ubuntu   inspiration   industry   speed   develop   customer   social   js   university   graphics   personal   framework   command   package   photo   report   buy  


Tag selected: security.

Clear all

Showing 173 results.

Looking up security tag. Showing 173 results. Clear

Can You Fly Drones In London?

https://www.silicon.co.uk/e-regulation/fly-drones-london-158901?inf_by=5c0a1cae671db84c038b507b

Saved by uncleflo on December 20th, 2018.

Drones are big business, and thousands of you would have received your very own for Christmas this year. The plummeting cost of components and the ease of buying remote controlled aircraft off the Internet has skyrocketed the use of consumer drones across the globe. Headlines are made every day, whether that’s new drones at CES, drones almost hitting passenger jets, or drones spying on unassuming victims. The CAA (Civil Aviation Authority) has already prosecuted two drone operators in the UK for breaching safety regulations, with numerous other investigations ongoing. In October, a man was arrested for operating a drone over Manchester City’s football stadium in a match with Tottenham Hotspur.

drone passenger breach safety prosecute operator london britain security story case blog article investigation spy victim caa reading information regulation description fly pilot


Steps to Get SSL Certificate Enabled

https://www.namecheap.com/support/knowledgebase/article.aspx/794/14/how-to-enable-ssl

Saved by uncleflo on December 19th, 2018.

The first step after your purchase, is to enable the SSL certificate. In order to do this, you'll first need to have a CSR code generated on your server by your hosting provider. You may also generate a one yourself by following our guide on generating CSR code.

guide start ssl generate administration website security certificate application howto enable cheap process follow solution instructions


SSL Checker

https://decoder.link/sslchecker

Saved by uncleflo on December 19th, 2018.

Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.

host technical lookup domain name tls ssl port secure check security website tool online link useful administration


AtoS - Trusted partner for your Digital Journey

https://atos.net/en/

Saved by uncleflo on October 23rd, 2018.

As technology continuously disrupts the norms, our clients can rely on us to guide them through a successful digital transformation. At Atos, we embrace this journey, striving to remain the trusted partner that delivers digital empowerment to our clients. Our keywords are digital transformation, innovation and value creation, both for our own company and for our clients. We have cemented our position as the trusted partner for our clients’ digital transformation, with the resources, the scale and the know-how that our clients need. Our management is fully dedicated and committed to helping our Group prepare for the future and ensure value is delivered to clients, shareholders, partners and employees. As a responsible employer and an ethical business partner, Atos’ aspiration is to create shared value for all our customers and other stakeholders. We believe that digital technologies can deliver a fairer and more inclusive world and can help protect our environment for generations to come. Alliances and partnerships with other industry leaders are crucial for us to combine world-class capabilities and provide the most innovative customer-focused offerings.

trust partner digital journey atos aspiration preparation transformation company client keyword industry future cybersecurity security cyber online profile advisor relationship value create


Hping

http://www.hping.org/

Saved by uncleflo on October 23rd, 2018.

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features. While hping was mainly used as a security tool in the past, it can be used in many ways by people that don't care about security to test networks and hosts.

ping commandline tcp ip packet command protocol traceroute channel feature security tool test network host analyse administration infrastructure server computer unix


IxLoad - L4-7 performance testing for multiplay services, application delivery platforms, and network security appliances

https://www.ixiacom.com/products/ixload

Saved by uncleflo on October 23rd, 2018.

Measure the quality of experience of real-time, business-critical applications with converged multiplay service emulations. Problem: Endangered quality of experience. In today’s highly competitive landscape, organizations must meet stringent network quality requirements to deliver the best customer experience. However, a widening array of multimedia applications, and an increasing number of users, is making it harder—and more expensive—than ever to validate converged multiplay services and application delivery platforms. Without a way to properly test these services, customer quality of experience is at risk.

measure quality realtime business critical application emulation simulation problem solution test experience delivery endanger requirement product company profile information reference administration validate cybersecurity security online platform


Cyberflood - Security and Performance Testing for App-Aware Solutions

https://www.spirent.com/Products/Cyberflood

Saved by uncleflo on October 23rd, 2018.

As the world’s highest performing L4-7 testing solution, CyberFlood emulates realistic application traffic while validating your security coverage from enterprise to carrier-grade network capacity. TestCloud, a core component of CyberFlood, has a library of tens of thousands of realistic applications and attack vectors and is regularly updated to ensure load and functional testing with unparalleled scalability, thus providing you with elevated security assurance. Built with teams in mind, whether at enterprises, service providers or network equipment manufacturers, our comprehensive security solutions platform improves testing today, while evolving for the future, so your organization stays ahead of the security curve.

cybersecurity security solution realistic application traffic validate enterprise carrier network capacity library attack online functional scalability assurance provider service platform organization website software administration


OWASP Zed Attack Proxy Project

https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

Saved by uncleflo on June 22nd, 2018.

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.

owasp proxy attack hacker hacking automation check pentesting experience application develop test vulnerability scan browser international world popular tool security continuous delivery


National Insurance: apply for a portable document A1/E101 if self-employed in European Economic Area (CA3837)

https://www.gov.uk/government/publications/national-insurance-application-for-form-e101-if-self-employed-in-european-economic-area-ca3837

Saved by uncleflo on June 15th, 2018.

You or your agent can use the online form service or postal form to apply for form A1/E101 to confirm you remain in the UK National Insurance scheme. Use this form if you’re normally self-employed in the UK and going to work temporarily in another country within the European Economic Area (EEA). This form will enable HM Revenue and Customs (HMRC) to determine which member state’s social security legislation will apply. If you’re a director of your own limited company you should complete forms CA3821 and CA3822.

government uk work abroad form apply confirm national insurance scheme insurance revenue custom security legislation director complete administration limited company


How to manually install the Securly SSL certificate in Chrome

https://support.securly.com/hc/en-us/articles/206081828-How-to-manually-install-the-Securly-SSL-certificate-in-Chrome

Saved by uncleflo on May 30th, 2018.

You would want to install the Securly SSL certificate in your Chrome browser to ensure the best browsing experience. The certificate does not control the level of filtering or what sites are allowed. The certificate will prevent errors on sites that Securly decrypts. Without the certificate, sites like Google.com and Facebook.com will show privacy errors, users will perceive this as the internet being “broken”. To install the Securly SSL certificate manually in Chrome, open ‘chrome://settings’ in your Chrome browser (version 59.0.3071 and above)

install security ssl certificate error localhost howto setup chrome google settings development administrator browser site root administer allow secure article description experience privacy


Setting up an SSL secured Webserver with CentOS

https://wiki.centos.org/HowTos/Https

Saved by uncleflo on May 30th, 2018.

This guide will explain how to set up a site over https. The tutorial uses a self signed key so will work well for a personal website or testing purposes. This is provided as is so proceed at your own risk and take backups! For an SSL encrypted web server you will need a few things. Depending on your install you may or may not have OpenSSL and mod_ssl, Apache's interface to OpenSSL.

setup administration server website openssl apache interface depend installation test tutorial key encryption howto backup explanation site security administrator development mod_ssl centos webserver ssl https process workflow troubleshoot guide


HTTPS Preventing Mixed Content

https://developers.google.com/web/fundamentals/security/prevent-mixed-content/fixing-mixed-content

Saved by uncleflo on May 30th, 2018.

Finding and fixing mixed content is an important task, but it can be time-consuming. This guide discusses some tools and techniques that are available to help with the process. For more information on mixed content itself, see What is Mixed Content. Manually finding mixed content can be time consuming, depending on the number of issues you have. The process described in this document uses the Chrome browser; however most modern browsers provide similar tools to help with this process.

mix content secure security online website guide tool technique implement fix web development description howto administration https console browser


FireEye - Solutions for security-conscious organizations

https://www.fireeye.com/

Saved by uncleflo on April 7th, 2018.

FireEye is on the front lines of cyber attacks every day. Our experts' knowledge of the threat landscape provides insights that enable us to build the best technologies in the industry. Using these technologies first-hand on the front lines further equips our product teams with a constant source of feedback. Through this feedback loop we continuously improve our products at a rate and with sophistication unmatched in the industry, creating a unique innovation cycle.

security company profile page website expert knowledge insight technology front secure hacking team support solution organization


FIN - Our core service for exchanging MT format financial messages

https://www.swift.com/our-solutions/global-financial-messaging/fin

Saved by uncleflo on March 27th, 2018.

FIN connects you to financial institutions, corporates and market infrastructures. FIN enables financial institutions to exchange individual structured (MT and ISO 15022 message formats) financial messages securely and reliably. FIN is used by over 10,800 financial institutions and their corporate customers worldwide to exchange over 22.3+ million messages per day across a wide range of business areas within the banking and securities industries. FIN value-added processing includes: Message validation to ensure messages are formatted according to SWIFT message standards. Delivery monitoring and prioritisation. Message storage and retrieval. It is based on a distributed processing architecture with full, built-in redundancy to ensure maximum availability.

financial infrastructure infra development administration institution exchange individual message security secure business industry validation standard monitor priority distributed database money fin iso corporation process availability


SEC suspends ‘bandwagon’ blockchain companies from trading

https://bravenewcoin.com/news/sec-suspends-bandwagon-blockchain-companies-from-trading/

Saved by uncleflo on March 19th, 2018.

In light of the increasing popularity of cryptocurrencies and blockchain technology, a new trend has developed among some small publicly-traded companies in the U.S. In the past few months, several listed companies that have previously had zero ties to the blockchain or digital currencies have announced that they would move into the cryptocurrencies business in one form or another. These announcements, in turn, caused the share prices of many of these small cap stocks to rally and in some cases more than double - without any substantial evidence that the companies were actually involved in blockchain-related activities. In other words, it appears some companies have chosen to pump their share prices by jumping onto the cryptocurrency bandwagon.

popular cryptocurrency crypto technology sec digital announcement business trade trend activity share security finance usa


Reolink - Your Best Security Solutions - That's What a Smart and Secure Home Should Be

https://reolink.com/

Saved by uncleflo on March 6th, 2018.

Committed to home and business security, Reolink delivers trusted and smart surveillance products and security solutions for millions of users Home Security Systems No Contract and No Monthly Fee. Truth is you won’t get any benefits by signing a contract and paying monthly for a security system. Get your home security camera system with no contact & no monthly fee... Battery Powered Outdoor Security Cameras: Top 3 Things You Should Know. You've GOT to know which features rank the top when it comes to choosing the best battery powered outdoor security cameras. Get insights and pick out yours..

commitment home business security reolink deliver trust surveillance product solution system contract fee benefit camera contact battery outdoor feature insight safety own look see contractless buy purchase get commerce administration


Running MySQL *.sql files in PHP Ask Question

https://stackoverflow.com/questions/4027769/running-mysql-sql-files-in-php

Saved by uncleflo on February 15th, 2018.

I have two *.sql files that I use when creating a new web site database. The first file creates all the tables. The second file populates some default records. I would like to execute these files from PHP. I also use the Zend_Framework, if that will help accomplish this? Answer: This question comes up from time to time. There's no good solution for running a .sql script directly from PHP. There are edge cases where statements common in a .sql script can't be executed as SQL statements. For example, the mysql tool has builtin commands that are not recognized by the MySQL Server, e.g. CONNECT, USE, and DELIMITER.

question stackoverflow mysql php execute solution answer tool command statement config script shell linux howto good technical development administration security website webdev


KuCoin - The People's Exchange

https://www.kucoin.com

Saved by uncleflo on February 11th, 2018.

Founded by a group of blockchain enthusiasts who had proved themselves in industry giants like Ant Financial and GF Securities, Kucoin aims at providing users digital asset transaction and exchange services which are even more safe and convenient, integrating premium assets worldwide, and constructing state of the art transaction platform. The founding team of Kucoin Blockchain Asset Exchange Platform has carried out in-depth research on blockchain technology as early as in 2011 and achieved the technical architecture of Kucoin exchange platform in 2013. The Kucoin team has officially entered the blockchain asset trading service platform in 2017 with the most reliable and extended technical architecture, superior service and better operation strategies to better serve blockchain asset transaction.

exchange enthusiast industry finance financial security digital asset transaction service safe convenient integrate invest investment worldwide construct art platform blockchain technology operation strategy


Poloniex

https://www.poloniex.com

Saved by uncleflo on February 11th, 2018.

We are a US-based digital asset exchange offering maximum security and advanced trading features. Trade securely on the world's most active digital asset exchange. Keeping hackers out. The vast majority of customer deposits are stored offline in air-gapped cold storage. We only keep enough online to facilitate active trading, which greatly minimizes risk and exposure. Monitoring around the clock. Our auditing programs monitor exchange activity 24/7/365. Their job is to report and block any suspicious activity before it becomes a problem. Your funds are yours. Period. Any funds you put into the exchange are only used to facilitate trading through your account. Unlike banks, we do not operate on fractional reserves.

exchange digital asset invest investment finance financial crypto cryptocurrency trade trading security bitcoin altcoin


freeformatter.com - Free Online Tools For Developers

https://www.freeformatter.com/batch-formatter.html

Saved by uncleflo on February 7th, 2018.

Free Online Tools For Developers. I created this website to help developers by providing them with free online tools. These tools include several formatters, validators, code minifiers, string escapers, encoders and decoders, message digesters, web resources and more. I will add new tools on a regular basis, so be sure to add this site to your bookmarks. If you encounter a bug, I would very much appreciate that you send me an email (freeformatter@gmail.com) that explains the nature of your bug. Please include details like which browser version you're using and the steps to reproduce the bug. Other comments are welcome. Please "+1" and/or "Facebook Like" this site if you thought it was useful.

online tool developer development security hacking cracking website format validator formatter escaper minifier decoder resource minify css js javascript validate minimize escape browser bookmark batch administration


Which characters need to be escaped in Bash? How do we know it?

https://stackoverflow.com/questions/15783701/which-characters-need-to-be-escaped-in-bash-how-do-we-know-it

Saved by uncleflo on February 7th, 2018.

Is there any comprehensive list of characters that need to be escaped in Bash? Can it be checked just with sed? In particular, I was checking whether % needs to be escaped or not. I tried this and worked fine, without escaping %. Does it mean % does not need to be escaped? Was this a good way to check the necessity? And more general: are they the same characters to escape in shell and bash?

question stackoverflow howto technical development list character escape escaping security bash shell script command commandline administration code maintenance hacking


Maltego Clients - There Are Four Types Of Maltego Clients

https://www.paterva.com/web7/buy/maltego-clients.php

Saved by uncleflo on January 27th, 2018.

Maltego eXtra Large is Paterva's new premium solution to visualise large data sets and is suited for people who need to show relationships between up to 1 million pieces of information. Maltego Classic is a commercial version of Maltego which includes access to all Paterva's standard OSINT transforms. Maltego Classic allows users to visualise up to 10 000 pieces of information and the relationships between them. Maltego CE is the community edition of Maltego and is available for free for everyone after a quick registration. It offers the same functionality as Maltego Classic with a few limitations. CaseFile is Paterva's answer to the offline intelligence problem. Combining Maltego's fantastic graph and link analysis functionality this tool allows for analysts to examine links between offline data.

Software system desktop client social hacking cyber security safety online people tool information administration reference technical lookup organization connection society


8 Ideas for How to Invest $5,000

https://www.goodfinancialcents.com/best-ways-to-invest-5000-dollars

Saved by uncleflo on December 28th, 2017.

When I first started to invest, I could only afford a measly $50 per month. Granted, I was in college still and living on Ramen noodles but with a part-time job at the mall and an internship at our local investment firm, I finally started to understand the importance of investing. Over time that $50 a month turned into $100 a month, then $250 a month and kept growing from there. It almost seemed surreal when it got to a point where I could invest $5000 at once into one investment. It was an awesome feeling but also scary knowing how long it took me to save up that $5000. Hopefully you have found yourself in the same situation, trying to figure out what to do with $5,000 sitting in your bank account. There are several different avenues you can take, and it's important that you understand all of your options. Regardless of if you're a new investor or a seasoned pro, it's vital that you make the best decision for your money. Thanks to the internet, there are a bunch of different ways that you can put your money to work. Your investment portfolio is going to secure your financial security. Take your time, do your research and find the best place for your $5k investment. This is a great opportunity to have a lasting impact on your future or that of your family.

invest money howto utilize security real estate option traditional idea suggestions reference list manage wealth account comparison understand read important


Crypterium ICO

https://crypterium.io/

Saved by uncleflo on December 28th, 2017.

Leading Cryptobank for the Cryptoeconomy. Crypterium's goal is to provide a complete vertically integrated service that encompasses the best ideas from the entire community of the world's best blockchain enthusiasts. A cryptobank for everyone. In 8 years’ time, the crypto-economy will exceed 10 trillion dollars. Cryptobanks will become a cornerstone in the relations between decentralized economy and future daily life by expanding payment infrastructure and possibilities, creating new cryptocurrency payments scenarios and lowering interest rates. Crypterium is a cryptobank creating the future, today. Crypterium is a contactless cryptobank for everyone. Everything you need in your smartphone: payments, transfers, currency exchange, instant loans. Our goal - replace your bank.

ico cryptocurrency integration service idea community blockchain enthusiasm economy payment possibilities scenario contactless back transfer exchange loan banking expand card virtual card principle infrastructure security loyalty credit technology system opportunity interaction app online


Full-Stack Cloud Native Monitoring Strategies

http://realscale.cloud66.com/full-stack-cloud-native-monitoring-strategies/

Saved by uncleflo on December 27th, 2017.

It is the weekend, late at night, or first thing Monday morning and you receive the dreaded phone call or SMS: “The application is down! We need all hands to figure this out!” After spending hours trying to track down the issue by reviewing logs, looking at the currently deployed code, and hundreds of IM exchanges, you finally find it – someone deployed a patch to production late Friday and it broke an important part of your application. You have probably been there. While tracking down issues can be difficult for any application, cloud native applications are particularly difficult. Applications are deployed to multiple servers across any number of zones. Servers have been created and destroyed. And the amount of traffic you must handle makes it hard to read log files (even centrally managed log files). So, how do you solve the need for monitoring in a cloud native architecture? While every application’s needs are different, we must first understand the options available to us. This article provides an overview of the goals of monitoring and the types of cloud native monitoring available, to help provide some insight into monitoring your Realscale applications.

monitor monitoring application application monitoring cloud code development administration architecture understand article overview realscale need zone deploy exchange production native explanation scaleble error handling performance server administrator developer operating system resource system query business security log