Konektom.org
K
Tags
Bookmarks
Add
Tools
Tools overview
Bookmarklet
Android app
Import
Export (HTML)
Manage tags
Contrast
API (beta!)
About
Sign up
Log in
pp26
41
public tag,
tweet
Jobs
tonies.de/jobs
bcrypt – Wikipedia
de.wikipedia.org/wiki/Bcrypt
dateutil - powerful extensions to datetime — dateutil 2.8.1 documentation
dateutil.readthedocs.io/en/stable
Streisand-Effekt – Wikipedia
de.wikipedia.org/wiki/Streisand-Effekt
Philipp Hagemeister, former YouTube-dl maintainer re: takedown | Hacker News
news.ycombinator.com/item?id=24887282
youtube-dl: Musikindustrie schießt mit der Schrotflinte auf Open Source
netzpolitik.org/2020/youtube-dl-musikindustrie-schiesst-mit-der-schrotflinte-auf-open-source
Geek Blight - Origins of the youtube-dl project
rg3.name/202011071352.html
youtube-dl
yt-dl.org
hashlib â Secure hashes and message digests — Python 3.9.1rc1 documentation
docs.python.org/3/library/hashlib.html#hashlib.pbkdf2_hmac
hashlib â Secure hashes and message digests — Python 3.9.1rc1 documentation
docs.python.org/3/library/hashlib.html#hashlib.scrypt
Defense in depth (computing) - Wikipedia
en.wikipedia.org/wiki/Defense_in_depth_(computing)
OpenID Connect | OpenID
openid.net/connect
OAuth 2.0 — OAuth
oauth.net/2
Implementing IndieAuth for Datasette
simonwillison.net/2020/Nov/18/indieauth
Security updates released | Weblog | Django
djangoproject.com/weblog/2009/oct/09/security
Application Monitoring and Error Tracking Software | Sentry
sentry.io/welcome
ELK Stack: Elasticsearch, Logstash und Kibana | Elastic
elastic.co/de/what-is/elk-stack
(New) Open Source
graylog.org/products/open-source
Directory traversal attack - Wikipedia
en.wikipedia.org/wiki/Directory_traversal_attack
5 Sicherheitslücken in Deiner Python-Anwendung
phihag.de/2018/pyddf-5vulns/#
Episode #18: Ten Years of Flask: Conversation With Creator Armin Ronacher – The Real Python Podcast
realpython.com/podcasts/rpp/18
Common Vulnerabilities and Exposures - Wikipedia
en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures
xkcd: Security
xkcd.com/538
Web Application Firewall – Wikipedia
de.wikipedia.org/wiki/Web_Application_Firewall
Penetrationstest (Informatik) – Wikipedia
de.wikipedia.org/wiki/Penetrationstest_(Informatik)
Evaluation Assurance Level - Wikipedia
en.wikipedia.org/wiki/Evaluation_Assurance_Level
Common Criteria - Wikipedia
en.wikipedia.org/wiki/Common_Criteria
Ariane V88 – Wikipedia
de.wikipedia.org/wiki/Ariane_V88
Ada (Programmiersprache) – Wikipedia
de.wikipedia.org/wiki/Ada_(Programmiersprache)
Adversarial machine learning - Wikipedia
en.wikipedia.org/wiki/Adversarial_machine_learning
Ransomware-Befall Uniklinik Düsseldorf
blog.fefe.de/?ts=a19dfb18
Denial-of-service attack - Wikipedia
en.wikipedia.org/wiki/Denial-of-service_attack
PostgreSQL driver for Python — Psycopg
psycopg.org
SQL injection - Wikipedia
en.wikipedia.org/wiki/SQL_injection
Executable space protection - Wikipedia
en.wikipedia.org/wiki/Executable_space_protection
Address space layout randomization - Wikipedia
en.wikipedia.org/wiki/Address_space_layout_randomization
Harvard-Architektur – Wikipedia
de.wikipedia.org/wiki/Harvard-Architektur
Von-Neumann-Architektur – Wikipedia
de.wikipedia.org/wiki/Von-Neumann-Architektur
Smashing the stack for fun and profit
inst.eecs.berkeley.edu/~cs161/fa08/papers/stack_smashing.pdf
tonies® - Willkommen in der Welt der Tonies!
tonies.de
Universität Düsseldorf: Netzwerksicherheit
cn.hhu.de/lehre-und-abschlussarbeiten/fruehere-lehrveranstaltungen/vorlesungen/ss-2017/netsec.html
... log in to see websites similar to the ones above.
Cookies help us to provide you an improved user experience. By continuing to use this site, you accept the use of cookies.
more info
OK