CTparental is a free and open-source parental control tool used to control computer usage or internet browsing. It comes with a simple and easy-to-use web interface powered by a Lighttpd web server. The idea of CTparental tool comes from other tools such as, iptables, dnsmasq, and inguardian privoxy.
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware. - Ultimate-Hosts-Blacklist/Ultimate.Hosts.Blacklist
Governments are back on their anti-encryption bullshit again. Between the U.S. Senate's "EARN IT" Act, the E.U.'s slew of anti-encryption proposals, and Australia's new anti-encryption law, it's become clear that the authoritarians in office view online privacy as a threat to their existence. Normally, when the governments increase their anti-privacy sabre-rattling, technologists start talking more…
An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting - ghacksuserjs/ghacks-user.js
Promether marks the end of surveillance and brings about a new era of online privacy,security, and anonymity. By merging blockchain technology, decentralized networks, and state-of-the-art encryption, Promether gives power and control back to the users.
Feitian ePass FIDO® - NFC is a FIDO alliance certified U2F authentication key. Unlike the traditional second factor authentication devices, FIDO U2F provides a much more convenient solution to replace or be a plus of traditional password.
A keep is an off-chain container for private data. Keeps help contracts harness the full power of the public blockchain — enabling deep interactivity with private data.
In order to authenticate users, web applications often store user passwords. This can be tricky, because password storage mechanisms are a watering hole for bad advice: there are several solutions to this problem but very few are truly secure. If you store the passwords of your users, your goal should be to make sure that in the event of a data compromise, user passwords should remain safe. The best way to store users passwords is to use a password-based key derivation function (PBKDF) with a sufficient work factor. If your application does not leverage a PBKDF, you should migrate password storage schemes immedietely. More on this later.
The Service Oriented Architecture (SOA) introduced a design paradigm, which talks about a highly decoupled service deployment where the services talk to each other over the network with a…
Read on to learn the basics of OAuth 2.0, key terms, registering clients and getting client credentials, etc., as well as to learn how to get access tokens.
OAuth 2 is an authorization framework that enables applications to obtain limited access to user accounts on an HTTP service, such as Facebook, GitHub, and DigitalOcean. It works by delegating user authentication to the service that hosts the user acc
Learn how to work from anywhere and keep your data, identity, and sanity. DOWNLOAD NOW So far in this series, we’ve walked through security considerations for your SysAdmin workstation from choosing the right hardware and Linux distribution, to setting up a secure pre-boot environment and distro installation. Now it’s time to cover post-installation hardening.
Project Calico is a new approach to virtual networking and network security for containers, VMs, and bare metal services, that provides a rich set of security enforcement capabilities running on top of a highly scalable and efficient virtual network fabric.
Explains how to install and use Gixy tool to analyze Nginx configuration to prevent security misconfiguration and automate flaw detection on Linux or Unix-like system.
Public key crypto for everyone, publicly auditable proofs of identity. Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it's open source and powered by public-key cryptography. Keybase is for anyone. Imagine a Slack for the whole world, except end-to-end encrypted across all your devices. Or a Team Dropbox where the server can't leak your files or be hacked.
User agents commonly apply same-origin restrictions to network requests. These restrictions prevent a client-side Web application running from one origin from obtaining data retrieved from another origin, and also limit unsafe HTTP requests that can be automatically launched toward destinations that differ from the running application's origin. In user agents that follow this pattern, network requests typically include user credentials with cross-origin requests, including HTTP authentication and cookie information.
Danny walkes us through hacking a vulnerable Node.js application, as well as looking in-depth into three different vulnerabilities in popular npm packages.