Skip to content
#

Security

Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.

Here are 15,729 public repositories matching this topic...

MrMendelli
MrMendelli commented Feb 20, 2022

Feature type

Quality of life

Describe the feature

I would like to be able to use relative paths in the launcher settings file to point to x32dbg.exe and x64dbg.exe respectively. I've already tried editing the file manually and assuming my implementation (.\/\//) isn't wrong, the launcher seemingly refuses the use of relative paths.

caddy
algo
RandomDSdevel
RandomDSdevel commented Sep 23, 2017

OS/Environment

None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)

Ansible version

None yet, as I haven't yet gotten that far into setting up Algo.

Version of components from requirements.txt

Not applicable (see above.)

Summary of the pro

Liberating Web Analytics. Star us on Github? +1. Matomo is the leading open alternative to Google Analytics that gives you full control over your data. Matomo lets you easily collect data from websites & apps and visualise this data and extract insights. Privacy is built-in. We love Pull Requests!

  • Updated Mar 7, 2022
  • PHP
nginxconfig.io
RebelliousWhiz
RebelliousWhiz commented Dec 29, 2021

Sorry for not following the template. It's a straightforward question.

By enabling "WordPress-specific rules", the following codes will be added to the wordpress.conf:

# WordPress: deny general stuff
location ~* ^/(?:xmlrpc\.php|wp-links-opml\.php|wp-config\.php|wp-config-sample\.php|readme\.html|license\.txt)$ {
    deny all;
}

However, this disables xmlrpc feature, which disa

Librechain
Librechain commented Oct 15, 2021

Asking about this since the NSA recently published guidance advising the public and private sectors to transition to cryptographic algorithms that are no less than sha384 & ec384 (elliptic curves).

While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit

cutter
RazviOverflow
RazviOverflow commented Feb 9, 2022

Environment information

  • Operating System: Linux kali 5.15.0-kali2-amd64 1 SMP Debian 5.15.5-2kali2 (2021-12-22) x86_64 GNU/Linux (Kali 2021.4)
  • Cutter version: Cutter v2.0.5-x64.Linux (AppImage)
  • Obtained from:
    • Built from source
    • Downloaded release from Cutter website or GitHub
    • Distribution repository
  • File format: ELF 64-bit LSB executable

**Describe the

Wikipedia
Wikipedia

Security apps

Snyk

Find, fix (and prevent!) known vulnerabilities in your code

Cloudback Backup

Backups your GitHub repository, code, LFS and metadata, on-demand and on-schedule

Semgrep

Code scanning at ludicrous speed. Find bugs and enforce code standards

WhiteSource Bolt

Detect open source vulnerabilities in real time with suggested fixes for quick remediation

GuardRails

GuardRails provides continuous security feedback for modern development teams

Renovate

Keep dependencies up-to-date with automated Pull Requests

LGTM

Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review

GitProtect.io Backup

Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support

Sonatype DepShield

Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen

See more Security apps