Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3http://techrights.org/o/2020/04/29/tde-10th-anniversary/
Alertmanager Watchdog monitoring with Nagios passive checks Install and Configure Apache Web Server on Ubuntu 20.04 VIM Exit and Save, for Beginners How to set Timers, Alarms, and
Links for the day
SIGPLAN Research Highlights Papershttps://www.sigplan.org/Highlights/Papers/
and perfomance monitoring units (PMU) to capture values of memory locations. They prove the efficacy of the sampling approach to capture events that happen frequently enough to ca
GPS Archives | Slashgeohttps://www.slashgeo.org/tag/gps.html
tracking and monitoring device" . It's a non-profit organization and they mention free software several times, but not certain that is open source software, anyone knows? From the
CELF Embedded Linux Conferencehttps://www.embeddedlinuxconference.com/elc_2009/sessions.html
for users to control monitoring of data without source code recompilation, application reloading and other superfluous actions. It provides an easy way for monitoring applications
Kicks Condorhttps://www.kickscondor.com/
used to have a way of monitoring RSS as a ‘live bookmark’ - which was REALLY WEIRD. This was removed in 2018. Kicks Condor 9 Jun 2021 • posted to /en/rss , +1 •&nbs
LEECHING AND LINKING IN THE HYPERTEXT KINGDOM
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
databases. Tools: monitoring/analysis tools, penetration tools, scripts. Techniques/strategies: scanning, fuzzing, common attacks. Legalities: don't try out these tools and techni
How to become a bug-bounty hunter and do penetration testing
Privacy Policyhttp://eBible.org/privacy.php
required for security monitoring purposes. All routers and computers between you and us have the capacity to log IP address information. That is the way the Internet works. IP add
IBM SAGEhttps://ed-thelen.org/comp-hist/vs-ibm-sage.html
and 370 at a satellite monitoring site in Australia. But, even if they were larger and faster computers, it just wasn't the same as the old Q-7. The Q-7 was the easiest computer I
The EBS Authenticator Word Listhttp://www.akdart.com/ebs.html
PSA's: In addition to monitoring the AP wire, radio (and TV) stations monitor other radio stations to this day, listening for EAS messages. Under the new system, each statio
This is a rare look at an old Emergency Broadcast System (EBS) authenticator word list from the early 1970's, as well as a number ofother historical documents concerning the EBS s
Capability Comparisonhttps://secushare.org/comparison
automated server memory monitoring ) or installed in a way that it cannot easily be found. This, thanks to push-to-talk, even works for conferences. Long-term use of such a config
Electricmonk.nl webloghttps://www.electricmonk.nl/log/
things, from servers to monitoring. Ansible is very powerful, but with great power comes great responsibility. One downside of automating many things with ansible is that you coul
Ferry Boender's blog
Order Of Magihttp://www.orderofmagi.com/
ASTACon Reviewing/Monitoring Everything Networked) Fibra( Fib eroptically Requiring A) Viacad(Very Ideally Automatically Coordinated Abstracted Design[er])}(4) New York, New York,
Those That Protect All, Those That Var The Illuminati, Those That Control All Beings; The Magi
Find more...