uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 3739 bookmarks.

Showing top Tags within 179 bookmarks

howto   development   information   guide   reference   administration   website   design   software   solution   service   business   linux   online   uk   server   code   web   tool   system   product   application   list   video   company   data   tutorial   blog   description   technology   article   explanation   security   world   create   experience   download   windows   project   free   lookup   build   learn   javascript   network   performance   marine   london   file   control   tools   library   research   technical   support   php   beautiful   programming   boat   example   opensource   html   community   image   computer   course   music   feature   database   youtube   share   browser   dance   quality   user   construction   mobile   install   power   internet   platform   3d   work   hardware   webdesign   purchase   css   standard   money   camera   access   profile   search   installation   source   developer   manage   test   industry   professional   event   management   advice   review   travel   engineering   material   phone   question   documentation   process   digital   speed   communication   cheap   engine   fast   client   story   content   simple   customer   idea   marketing   program   develop   script   api   buy   photography   setup   interface   google   discussion   app   account   usa   device   live   study   startup   resource   operation   market   monitor   package   inspiration   compare   analysis   cloud  


Tag selected: security.

Clear all

Showing 179 results.

Looking up security tag. Showing 179 results. Clear

ISO/IEC 27000 Cyber Security - Wikipedia

https://en.wikipedia.org/wiki/ISO/IEC_27000

Saved by uncleflo on December 17th, 2019.

ISO/IEC 27000 is part of a growing family of ISO/IEC Information Security Management Systems (ISMS) standards, the 'ISO/IEC 27000 series'. ISO/IEC 27000 is an international standard entitled: Information technology — Security techniques — Information security management systems — Overview and vocabulary. The standard was developed by subcommittee 27 (SC27) of the first Joint Technical Committee (JTC1) of the International Organization for Standardization and the International Electrotechnical Commission.[1]

standardization terminology risk certification security define assessment information management recommend standard technical approach organization commission digital assess wikipedia technology technique system overview cyber hacking web online


AWS Certified Solutions Architect - Professional

https://aws.amazon.com/certification/certified-solutions-architect-professional/

Saved by uncleflo on July 11th, 2019.

The AWS Certified Solutions Architect – Professional exam is intended for individuals who perform a Solutions Architect–Professional role with one or more years of hands-on experience managing and operating systems on AWS. Build on concepts introduced in Architecting on AWS. Learn how to build complex solutions that incorporate data services, governance, and security on the AWS platform. You will also learn about specialized AWS services, including AWS Direct Connect and AWS Storage Gateway, that support hybrid architecture, and you will learn about best practices for building scalable, elastic, secure, and highly available applications on AWS.

scalable enroll amazon fundamentals validation classroom migration cloud automation framework inventory prepare documentation employer design incorporate risk certified understand introduce certification architect workshop presents execution aws specialize platform security practice elastic architecture manage operation system solution teach


RFC 3986 - Uniform Resource Identifier (URI): Generic Syntax (RFC3986)

http://www.faqs.org/rfcs/rfc3986.html

Saved by uncleflo on June 23rd, 2019.

A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.

internet standard uri character resource specification syntax resolve resolution convert requirement security analysis scheme component guideline consideration perform identifier format quideline rfc


Unicode character property - Wikipedia

https://en.wikipedia.org/wiki/Unicode_character_property

Saved by uncleflo on June 23rd, 2019.

The Unicode Standard assigns character properties to each code point. These properties can be used to handle "characters" (code points) in processes, like in line-breaking, script direction right-to-left or applying controls. Slightly inconsequently, some "character properties" are also defined for code points that have no character assigned, and code points that are labeled like "<not a character>". The character properties are described in Standard Annex #44.

ideograph hyphen glyph code category description reference list property process administration security point assign label shape ascii specify quote character text describe


Wordpress Development - Validating Sanitizing and Escaping User Data

https://codex.wordpress.org/Validating_Sanitizing_and_Escaping_User_Data

Saved by uncleflo on June 18th, 2019.

Your code works, but is it safe? When writing code that will run across hundreds if not thousands of websites, you should be extra cautious of how you handle data coming into WordPress and how it's then presented to the end user. This commonly comes up when building a settings page for your theme, creating and manipulating shortcodes, or saving and rendering extra data associated with a post.

code development render data post website php sanitize validate escape administer caution associate build settings wordpress user input secure security page article information


AWS Marketplace: CentOS 7 (x86_64) - with Updates HVM

https://aws.amazon.com/marketplace/pp/B00O7WM7QW

Saved by uncleflo on May 24th, 2019.

This is the Official CentOS 7 x86_64 HVM image that has been built with a minimal profile, suiteable for use in HVM instance types only. The image contains just enough packages to run within AWS, bring up an SSH Server and allow users to login. Please note that this is the default CentOS-7 image that we recommend everyone uses. It contains packages that are updated at points in time to include critical security updates.

unix recommend minimal server image profile instance critical security official version system package aws amazon howto centos update hvm snapshot development administration contain offical


Can You Fly Drones In London?

https://www.silicon.co.uk/e-regulation/fly-drones-london-158901?inf_by=5c0a1cae671db84c038b507b

Saved by uncleflo on December 20th, 2018.

Drones are big business, and thousands of you would have received your very own for Christmas this year. The plummeting cost of components and the ease of buying remote controlled aircraft off the Internet has skyrocketed the use of consumer drones across the globe. Headlines are made every day, whether that’s new drones at CES, drones almost hitting passenger jets, or drones spying on unassuming victims. The CAA (Civil Aviation Authority) has already prosecuted two drone operators in the UK for breaching safety regulations, with numerous other investigations ongoing. In October, a man was arrested for operating a drone over Manchester City’s football stadium in a match with Tottenham Hotspur.

drone passenger breach safety prosecute operator london britain security story case blog article investigation spy victim caa reading information regulation description fly pilot


Steps to Get SSL Certificate Enabled

https://www.namecheap.com/support/knowledgebase/article.aspx/794/14/how-to-enable-ssl

Saved by uncleflo on December 19th, 2018.

The first step after your purchase, is to enable the SSL certificate. In order to do this, you'll first need to have a CSR code generated on your server by your hosting provider. You may also generate a one yourself by following our guide on generating CSR code.

guide start ssl generate administration website security certificate application howto enable cheap process follow solution instructions


SSL Checker

https://decoder.link/sslchecker

Saved by uncleflo on December 19th, 2018.

Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.

host technical lookup domain name tls ssl port secure check security website tool online link useful administration


AtoS - Trusted partner for your Digital Journey

https://atos.net/en/

Saved by uncleflo on October 23rd, 2018.

As technology continuously disrupts the norms, our clients can rely on us to guide them through a successful digital transformation. At Atos, we embrace this journey, striving to remain the trusted partner that delivers digital empowerment to our clients. Our keywords are digital transformation, innovation and value creation, both for our own company and for our clients. We have cemented our position as the trusted partner for our clients’ digital transformation, with the resources, the scale and the know-how that our clients need. Our management is fully dedicated and committed to helping our Group prepare for the future and ensure value is delivered to clients, shareholders, partners and employees. As a responsible employer and an ethical business partner, Atos’ aspiration is to create shared value for all our customers and other stakeholders. We believe that digital technologies can deliver a fairer and more inclusive world and can help protect our environment for generations to come. Alliances and partnerships with other industry leaders are crucial for us to combine world-class capabilities and provide the most innovative customer-focused offerings.

trust partner digital journey atos aspiration preparation transformation company client keyword industry future cybersecurity security cyber online profile advisor relationship value create


Hping

http://www.hping.org/

Saved by uncleflo on October 23rd, 2018.

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features. While hping was mainly used as a security tool in the past, it can be used in many ways by people that don't care about security to test networks and hosts.

ping commandline tcp ip packet command protocol traceroute channel feature security tool test network host analyse administration infrastructure server computer unix


IxLoad - L4-7 performance testing for multiplay services, application delivery platforms, and network security appliances

https://www.ixiacom.com/products/ixload

Saved by uncleflo on October 23rd, 2018.

Measure the quality of experience of real-time, business-critical applications with converged multiplay service emulations. Problem: Endangered quality of experience. In today’s highly competitive landscape, organizations must meet stringent network quality requirements to deliver the best customer experience. However, a widening array of multimedia applications, and an increasing number of users, is making it harder—and more expensive—than ever to validate converged multiplay services and application delivery platforms. Without a way to properly test these services, customer quality of experience is at risk.

measure quality realtime business critical application emulation simulation problem solution test experience delivery endanger requirement product company profile information reference administration validate cybersecurity security online platform


Cyberflood - Security and Performance Testing for App-Aware Solutions

https://www.spirent.com/Products/Cyberflood

Saved by uncleflo on October 23rd, 2018.

As the world’s highest performing L4-7 testing solution, CyberFlood emulates realistic application traffic while validating your security coverage from enterprise to carrier-grade network capacity. TestCloud, a core component of CyberFlood, has a library of tens of thousands of realistic applications and attack vectors and is regularly updated to ensure load and functional testing with unparalleled scalability, thus providing you with elevated security assurance. Built with teams in mind, whether at enterprises, service providers or network equipment manufacturers, our comprehensive security solutions platform improves testing today, while evolving for the future, so your organization stays ahead of the security curve.

cybersecurity security solution realistic application traffic validate enterprise carrier network capacity library attack online functional scalability assurance provider service platform organization website software administration


OWASP Zed Attack Proxy Project

https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

Saved by uncleflo on June 22nd, 2018.

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.

owasp proxy attack hacker hacking automation check pentesting experience application develop test vulnerability scan browser international world popular tool security continuous delivery


National Insurance: apply for a portable document A1/E101 if self-employed in European Economic Area (CA3837)

https://www.gov.uk/government/publications/national-insurance-application-for-form-e101-if-self-employed-in-european-economic-area-ca3837

Saved by uncleflo on June 15th, 2018.

You or your agent can use the online form service or postal form to apply for form A1/E101 to confirm you remain in the UK National Insurance scheme. Use this form if you’re normally self-employed in the UK and going to work temporarily in another country within the European Economic Area (EEA). This form will enable HM Revenue and Customs (HMRC) to determine which member state’s social security legislation will apply. If you’re a director of your own limited company you should complete forms CA3821 and CA3822.

government uk work abroad form apply confirm national insurance scheme insurance revenue custom security legislation director complete administration limited company


How to manually install the Securly SSL certificate in Chrome

https://support.securly.com/hc/en-us/articles/206081828-How-to-manually-install-the-Securly-SSL-certificate-in-Chrome

Saved by uncleflo on May 30th, 2018.

You would want to install the Securly SSL certificate in your Chrome browser to ensure the best browsing experience. The certificate does not control the level of filtering or what sites are allowed. The certificate will prevent errors on sites that Securly decrypts. Without the certificate, sites like Google.com and Facebook.com will show privacy errors, users will perceive this as the internet being “broken”. To install the Securly SSL certificate manually in Chrome, open ‘chrome://settings’ in your Chrome browser (version 59.0.3071 and above)

install security ssl certificate error localhost howto setup chrome google settings development administrator browser site root administer allow secure article description experience privacy


Setting up an SSL secured Webserver with CentOS

https://wiki.centos.org/HowTos/Https

Saved by uncleflo on May 30th, 2018.

This guide will explain how to set up a site over https. The tutorial uses a self signed key so will work well for a personal website or testing purposes. This is provided as is so proceed at your own risk and take backups! For an SSL encrypted web server you will need a few things. Depending on your install you may or may not have OpenSSL and mod_ssl, Apache's interface to OpenSSL.

setup administration server website openssl apache interface depend installation test tutorial key encryption howto backup explanation site security administrator development mod_ssl centos webserver ssl https process workflow troubleshoot guide


HTTPS Preventing Mixed Content

https://developers.google.com/web/fundamentals/security/prevent-mixed-content/fixing-mixed-content

Saved by uncleflo on May 30th, 2018.

Finding and fixing mixed content is an important task, but it can be time-consuming. This guide discusses some tools and techniques that are available to help with the process. For more information on mixed content itself, see What is Mixed Content. Manually finding mixed content can be time consuming, depending on the number of issues you have. The process described in this document uses the Chrome browser; however most modern browsers provide similar tools to help with this process.

mix content secure security online website guide tool technique implement fix web development description howto administration https console browser


FireEye - Solutions for security-conscious organizations

https://www.fireeye.com/

Saved by uncleflo on April 7th, 2018.

FireEye is on the front lines of cyber attacks every day. Our experts' knowledge of the threat landscape provides insights that enable us to build the best technologies in the industry. Using these technologies first-hand on the front lines further equips our product teams with a constant source of feedback. Through this feedback loop we continuously improve our products at a rate and with sophistication unmatched in the industry, creating a unique innovation cycle.

security company profile page website expert knowledge insight technology front secure hacking team support solution organization


FIN - Our core service for exchanging MT format financial messages

https://www.swift.com/our-solutions/global-financial-messaging/fin

Saved by uncleflo on March 27th, 2018.

FIN connects you to financial institutions, corporates and market infrastructures. FIN enables financial institutions to exchange individual structured (MT and ISO 15022 message formats) financial messages securely and reliably. FIN is used by over 10,800 financial institutions and their corporate customers worldwide to exchange over 22.3+ million messages per day across a wide range of business areas within the banking and securities industries. FIN value-added processing includes: Message validation to ensure messages are formatted according to SWIFT message standards. Delivery monitoring and prioritisation. Message storage and retrieval. It is based on a distributed processing architecture with full, built-in redundancy to ensure maximum availability.

financial infrastructure infra development administration institution exchange individual message security secure business industry validation standard monitor priority distributed database money fin iso corporation process availability


SEC suspends ‘bandwagon’ blockchain companies from trading

https://bravenewcoin.com/news/sec-suspends-bandwagon-blockchain-companies-from-trading/

Saved by uncleflo on March 19th, 2018.

In light of the increasing popularity of cryptocurrencies and blockchain technology, a new trend has developed among some small publicly-traded companies in the U.S. In the past few months, several listed companies that have previously had zero ties to the blockchain or digital currencies have announced that they would move into the cryptocurrencies business in one form or another. These announcements, in turn, caused the share prices of many of these small cap stocks to rally and in some cases more than double - without any substantial evidence that the companies were actually involved in blockchain-related activities. In other words, it appears some companies have chosen to pump their share prices by jumping onto the cryptocurrency bandwagon.

popular cryptocurrency crypto technology sec digital announcement business trade trend activity share security finance usa


Reolink - Your Best Security Solutions - That's What a Smart and Secure Home Should Be

https://reolink.com/

Saved by uncleflo on March 6th, 2018.

Committed to home and business security, Reolink delivers trusted and smart surveillance products and security solutions for millions of users Home Security Systems No Contract and No Monthly Fee. Truth is you won’t get any benefits by signing a contract and paying monthly for a security system. Get your home security camera system with no contact & no monthly fee... Battery Powered Outdoor Security Cameras: Top 3 Things You Should Know. You've GOT to know which features rank the top when it comes to choosing the best battery powered outdoor security cameras. Get insights and pick out yours..

commitment home business security reolink deliver trust surveillance product solution system contract fee benefit camera contact battery outdoor feature insight safety own look see contractless buy purchase get commerce administration


Running MySQL *.sql files in PHP Ask Question

https://stackoverflow.com/questions/4027769/running-mysql-sql-files-in-php

Saved by uncleflo on February 15th, 2018.

I have two *.sql files that I use when creating a new web site database. The first file creates all the tables. The second file populates some default records. I would like to execute these files from PHP. I also use the Zend_Framework, if that will help accomplish this? Answer: This question comes up from time to time. There's no good solution for running a .sql script directly from PHP. There are edge cases where statements common in a .sql script can't be executed as SQL statements. For example, the mysql tool has builtin commands that are not recognized by the MySQL Server, e.g. CONNECT, USE, and DELIMITER.

question stackoverflow mysql php execute solution answer tool command statement config script shell linux howto good technical development administration security website webdev


KuCoin - The People's Exchange

https://www.kucoin.com

Saved by uncleflo on February 11th, 2018.

Founded by a group of blockchain enthusiasts who had proved themselves in industry giants like Ant Financial and GF Securities, Kucoin aims at providing users digital asset transaction and exchange services which are even more safe and convenient, integrating premium assets worldwide, and constructing state of the art transaction platform. The founding team of Kucoin Blockchain Asset Exchange Platform has carried out in-depth research on blockchain technology as early as in 2011 and achieved the technical architecture of Kucoin exchange platform in 2013. The Kucoin team has officially entered the blockchain asset trading service platform in 2017 with the most reliable and extended technical architecture, superior service and better operation strategies to better serve blockchain asset transaction.

exchange enthusiast industry finance financial security digital asset transaction service safe convenient integrate invest investment worldwide construct art platform blockchain technology operation strategy


Poloniex

https://www.poloniex.com

Saved by uncleflo on February 11th, 2018.

We are a US-based digital asset exchange offering maximum security and advanced trading features. Trade securely on the world's most active digital asset exchange. Keeping hackers out. The vast majority of customer deposits are stored offline in air-gapped cold storage. We only keep enough online to facilitate active trading, which greatly minimizes risk and exposure. Monitoring around the clock. Our auditing programs monitor exchange activity 24/7/365. Their job is to report and block any suspicious activity before it becomes a problem. Your funds are yours. Period. Any funds you put into the exchange are only used to facilitate trading through your account. Unlike banks, we do not operate on fractional reserves.

exchange digital asset invest investment finance financial crypto cryptocurrency trade trading security bitcoin altcoin