-
Updated
Oct 4, 2020
Security
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 11,394 public repositories matching this topic...
-
Updated
Oct 15, 2020 - C++
-
Updated
Oct 11, 2020
OS/Environment
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
Ansible version
None yet, as I haven't yet gotten that far into setting up Algo.
Version of components from requirements.txt
Not applicable (see above.)
Summary of the pro
-
Updated
Oct 2, 2020
-
Updated
Oct 15, 2020 - Python
-
Updated
Sep 15, 2020 - Python
-
Updated
Oct 16, 2020 - C++
-
Updated
Oct 15, 2020 - Python
-
Updated
Oct 8, 2020
-
Updated
Oct 1, 2020 - Shell
-
Updated
Oct 14, 2020 - Python
Work environment
| Questions | Answers |
|---|---|
| OS/arch/bits (mandatory) | Ubuntu x86 64, Ubuntu ARM64, Ubuntu PPC |
| File format of the file you reverse (mandatory) | - |
| Architecture/bits of the file (mandatory) | PPC, x86/64, ARMv |
-
Updated
Oct 13, 2020 - Shell
-
Updated
Oct 12, 2020 - SCSS
Thanks for this amazing tool!
The issue is as following:
If there are two virtual hosts (Server blocks) serving two host names or subdomains:
sd1.domain.com
sd2.domain.com
When the configuration is generated using the nginxconfig and if HTTP to HTTPS redirect is enabled following server block gets generated for each host:
--- For virtual host 1
# HTTP redirect
server {
add security.txt
-
Updated
Oct 16, 2020 - C++
-
Updated
Jan 21, 2020
The upstream issues got closed. It is referenced in:
-
Updated
Oct 15, 2020 - PHP
-
Updated
Aug 16, 2020 - Python
-
Updated
Oct 2, 2020 - JavaScript
-
Updated
Oct 14, 2020 - Go
-
Updated
Oct 16, 2020 - Go
Create simple ERC20 and ERC777 presets with fixed supply.
The benefits are:
- Easy to deploy (including from Remix).
- No access control (for minting/pausing), and hence no governance required.
- Can be verified easily on public networks and then are verified for all.
Community members are creating their own simple ERC20 tokens, so it would be good if they
-
Updated
Jun 28, 2020 - Python
-
Updated
Apr 5, 2020
- Wikipedia
- Wikipedia
Security apps
GuardRails
GuardRails provides continuous security feedback for modern development teams
BackHub
Reliable GitHub repository backup, set up in minutes
Dependabot Preview
Automated dependency updates for Ruby, JavaScript, Python, Go, PHP, Elixir, Rust, Java and .NET
LGTM
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
Renovate
Keep dependencies up-to-date with automated Pull Requests
Sonatype DepShield
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
Snyk
Find, fix (and prevent!) known vulnerabilities in your code
WhiteSource Bolt
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Caddy version:
v2.2.0 h1:sMUFqTbVIRlmA8NkFnNt9l7s0e+0gw+7GPIrhty905A=I am trying to pass pem-encoded client certificate to proxied service via a X-SSL-Cert header, like so: