Breaking News

Hacker News

Hacker News

2016 State of Application Security: Skills, Configurations and Components7

Sans help

A fully integrated AppSec program can reap benefits in overall security posture and IR capabilities.

Read More
hacktricks_google

Googlehacking

Googlehacking Google search Commands This are commands to use when in google search especially when google does like your site and a general search shows nothing. site: define: filetypes: intitle: author: Ctrl F to find ~ related “” exact “name only” – exclude .. between 2..10 Attribute to HackCollege.com with this graphic and info. So […]

Read More
Obama's Yard Sale

SSL Good and Bad

SSL is like a driver’s license or a passport to the world. Each person or company ought to be issued that license. And since this is the heart of security and a license. SSL should not be distributed by profiteering companies like Norton charging thousand dollars for so-called insurance. ‘

Read More
Cyber Crime

Cyber Attacks Hacking

Bruce Schneier is an internationally renowned security technologist, called a “security guru” by the Economist.

Read More

Cyber Threat Source Descriptions

Traditional terrorist adversaries of the U.S., despite their intentions to damage U.S. interests, are less developed in their computer network capabilities and propensity to pursue cyber means than are other types of adversaries.

Read More

Gods of Internet Destroys Websites

Gods of Internet Destroys Websites and ruin Freedom of the Internet! I honestly think certs and secured hosting (https) ought to be provided by search engines to hosting companies when you register your domain with them. They ought to give us something for using our data to further their wealth.

Read More

Social Media #deepstate

I have been writing about this for several years. I called it the 4th Branch of Government in the Obama years.

Read More
WordPress Appliance - Powered by TurnKey Linux