wiby  
Settings



Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3

http://techrights.org/o/2020/04/29/tde-10th-anniversary/

Alertmanager Watchdog monitoring with Nagios passive checks Install and Configure Apache Web Server on Ubuntu 20.04 VIM Exit and Save, for Beginners How to set Timers, Alarms, and
Links for the day

SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

and perfomance monitoring units (PMU) to capture values of memory locations. They prove the efficacy of the sampling approach to capture events that happen frequently enough to ca

GPS Archives | Slashgeo

https://www.slashgeo.org/tag/gps.html

tracking and monitoring device" . It's a non-profit organization and they mention free software several times, but not certain that is open source software, anyone knows? From the

CELF Embedded Linux Conference

https://www.embeddedlinuxconference.com/elc_2009/sessions.html

for users to control monitoring of data without source code recompilation, application reloading and other superfluous actions. It provides an easy way for monitoring applications

Kicks Condor

https://www.kickscondor.com/

used to have a way of monitoring RSS as a ‘live bookmark’ - which was REALLY WEIRD. This was removed in 2018. Kicks Condor 9 Jun 2021 • posted to /en/rss , +1 •&nbs
LEECHING AND LINKING IN THE HYPERTEXT KINGDOM

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

databases. Tools: monitoring/analysis tools, penetration tools, scripts. Techniques/strategies: scanning, fuzzing, common attacks. Legalities: don't try out these tools and techni
How to become a bug-bounty hunter and do penetration testing

Privacy Policy

http://eBible.org/privacy.php

required for security monitoring purposes. All routers and computers between you and us have the capacity to log IP address information. That is the way the Internet works. IP add

IBM SAGE

https://ed-thelen.org/comp-hist/vs-ibm-sage.html

and 370 at a satellite monitoring site in Australia. But, even if they were larger and faster computers, it just wasn't the same as the old Q-7. The Q-7 was the easiest computer I

The EBS Authenticator Word List

http://www.akdart.com/ebs.html

PSA's: In addition to monitoring the AP wire, radio (and TV) stations monitor other radio stations to this day, listening for EAS messages.  Under the new system, each statio
This is a rare look at an old Emergency Broadcast System (EBS) authenticator word list from the early 1970's, as well as a number ofother historical documents concerning the EBS s

Capability Comparison

https://secushare.org/comparison

automated server memory monitoring ) or installed in a way that it cannot easily be found. This, thanks to push-to-talk, even works for conferences. Long-term use of such a config

Electricmonk.nl weblog

https://www.electricmonk.nl/log/

things, from servers to monitoring. Ansible is very powerful, but with great power comes great responsibility. One downside of automating many things with ansible is that you coul
Ferry Boender's blog

Order Of Magi

http://www.orderofmagi.com/

ASTACon Reviewing/Monitoring Everything Networked) Fibra( Fib eroptically Requiring A) Viacad(Very Ideally Automatically Coordinated Abstracted Design[er])}(4) New York, New York,
Those That Protect All, Those That Var The Illuminati, Those That Control All Beings; The Magi


Find more...