Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

May 15 2018

Finkregh starred wesleyraptor/streamingphish

<!-- watch -->
@</a><a href=finkregh" />
Finkregh starred wesleyraptor/streamingphish May 15, 2018

Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.

Jupyter Notebook 68 Updated May 15

Die Gewerkschaft der Polizei geht auf Distanz zum geplanten Gesetzesvorhaben in Bayern. #PAGpic.twitter.com/URaHrlelaB

Finkregh starred huangyz0918/Hackintosh-Installer-University

<!-- watch -->
@</a><a href=finkregh" />

open source tutorial & information collector for hackintosh installation. 💻➕🍎

349 1 issue needs help Updated May 15

Finkregh starred anordal/shellharden

<!-- watch -->
@</a><a href=finkregh" />
Finkregh starred anordal/shellharden May 15, 2018

A bash syntax highlighter that encourages (and can fix) proper quoting of variables

Rust 1.3k Updated May 15

Let's talk about packages

Recently the Python community got to celebrate the triumphant launch of the new Python Package Index. It’s been a long time coming, and the folks who made it happen all deserve a round of applause. PyPI is an incredibly important piece of infrastructure for the Python community, and if you use Python you probably use PyPI, directly or indirectly, on a daily basis, and many different sites, services, and companies rely heavily on it. But: if you rely on PyPI, how often do you think about that reliance? What would you do if an incompatible version of one of your dependencies, or one of your dependencies’ dependencies, suddenly appeared? What if one of them disappeared? Would your applications or your deployments break? What would you do if PyPI had extended downtime? Would you still be able to deploy your applications? What if PyPI got hacked? If someone replaced one or more packages with malicious versions, would you be safe, or would you install the malicious packages and end up running them on your servers? The people who run PyPI are smart and conscientious and do what they can to keep it running 24/7 and not hacked, but these are still serious questions you should be thinking about. The people who run PyPI certainly are thinking about some of the scarier cases, and working on ways to make them less scary, but there are also things you can do. So let’s talk a bit about that.

Finkregh starred christophetd/duplicacy-autobackup

<!-- watch -->
@</a><a href=finkregh" />

💾 Painless automated backups to multiple storage providers with Docker and duplicacy.

Shell 148 Updated May 15

May 14 2018

Finkregh commented on issue mvdan/sh#238

<!-- issue_comment -->
@</a><a href=finkregh" />
Finkregh commented on issue mvdan/sh#238 May 14, 2018
@</a><a href=finkregh" />Finkregh commented May 14, 2018

I have no clue, as i am a total noob in the whole golang-versioning thing. perhaps via https://blog.alexellis.io/inject-build-time-vars-golang/ or h…

Finkregh starred guardicore/monkey

<!-- watch -->
@</a><a href=finkregh" />
Finkregh starred guardicore/monkey May 14, 2018

Infection Monkey - An automated pentest tool

Python 1.5k 4 issues need help Updated May 14

Finkregh starred hannob/snallygaster

<!-- watch -->
@</a><a href=finkregh" />
Finkregh starred hannob/snallygaster May 14, 2018

Tool to scan for secret files on HTTP servers

Python 1.1k Updated May 14

Who in their right mind would allow all of the above? It just does not feel right... letting your mail client auto-decrypt and load stuff from arbitrary sources from the web already sounds like a rather obvious bad idea. Sad to see this wrapped in a disinformation/PR campaign.

Who in their right mind would allow all of the above? It just does not feel right... letting your mail client auto-decrypt and load stuff from arbitrary sources from the web already sounds like a rather obvious bad idea. Sad to see this wrapped in a disinformation/PR campaign.

For everybody interested in facts instead of fearmongering: They did not break “eMail encryption”, but found out that if you allow your mail client to render dynamic content (HTML) and connect to arbitrary hosts and automatically decrypt stuff, you got a problem. else you’re fine

For everybody interested in facts instead of fearmongering: They did not break “eMail encryption”, but found out that if you allow your mail client to render dynamic content (HTML) and connect to arbitrary hosts and automatically decrypt stuff, you got a problem. else you’re fine

A Homomorphic Encryption Illustrated Primer

Homomorphic encryption schemes provide an amazing capability - to be able to perform calculations on data without knowing what the data is. This lets you work out the answer to questions while keeping potentially sensitive source data private. [...]

Finkregh opened an issue in mvdan/sh

<!-- issues -->
@</a><a href=finkregh" />
Finkregh opened an issue in mvdan/sh May 14, 2018
add git commit ID to version string #238

It would be nice to have the git commit ID in the version output. Like that we could differ between builds of the master branch and "proper ones"/r…

Finkregh starred arkadiyt/aws_public_ips

<!-- watch -->
@</a><a href=finkregh" />
Finkregh starred arkadiyt/aws_public_ips May 14, 2018

Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services

Ruby 23 Updated May 14

Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl