Going serverless with AWS Lambda and Python
Polly Politician is looking to get voted into office. She has teamed up with Selly Celebrity, and together they are running an SMS voter campaign.
Tags: #python #twilio #contentful #SMS #API #serverless #aws lambda #zappa
The free way to protect your privacy online
Everyone has the right to respect for his private and family life, his home and his correspondence. That sounds like freedom to me. In fact, that first sentence was put into writing over sixty years ago. It can be found in the European Convention on Humas Rights under article eight — Right to respect for private and family life.
Tags: #privacy #security #vpn #opera
Impressions from 34C3 In Leipzig
It’s big — very big. The last time I visited the congress was around ten years ago. This was back when the event was held in Berlin. Since then, it has moved to Hamburg and now temporarily to Leipzig.
Tags: #34c3 #leipzig #ccc #chaos computer club
macOS High Sierra Hack
Do you find having to type in the root password annoying and time-consuming? Then this security vulnerability is for you. Read this article to learn how easy it is to exploit this vulnerability in macOS High Sierra.
Tags: #macOS #hack #password
The Right Way To Render Markdown With Flask
Sooner or later you’re going to run into markdown that you need to render inside a Flask app. This article will tech you the best way to render markdown in a modern way. You will also learn how to enable code highlighting to make those code snippets in your markdown shine brighter that the sun.
Tags: #python #flask #markdown #highlight.js
Turn markdown into HTML using markdown-it
Markdown is great. It's easy to learn, has a reasonably straight forward sytax and is supported by many platfroms. But sometimes you need to more functionality than markdown traditionally allows. Like support for inserting id and class attributes for example.
An Introduction To Nmap
One of the most well-known network scanners is Nmap. With a name derived from network mapper, Nmap has been around since 1997 and continues to be actively developed. As of March 2016, the latest stable version is 7. Nmap’s speed, reliability, and customization options have made it the preferred go-to tool for many network and security professionals.
Tags: #nmap #scanning #fingerprinting #nmapscriptingengine #tcpscan #udpscan
Automated Vulnerability Scanners
Automated vulnerability scanners, or AVS, are great. They can quickly scan a vast network for vulnerabilities for a fraction of the cost of bringing in a dedicated security tester. AVS can also be scheduled to do its work in a way that no human can. Furthermore, AVS are outstanding when it comes to scanning large network segments and comparing the result against a predefined security baseline or a previous scan.
Tags: #vulnerabilityscanners #AVS #penetrationtesting
How To Become A Penetration Tester
Being a good security tester takes a lot of passion and dedication. An interesting side to the security tester profession is that there will always be new threats and vulnerabilities to dig into. While the never-ending flood of reported security breaches may seem somewhat intimidating, the following list of tips on how to become a better security tester might help you stay afloat.
Tags: #advice #penetrationtester #top10advice
A fundamental part of most security tests is to scan the in-scope network segment for available services. These services, also known as network daemons, are processes that run on networked systems and listen to incoming network traffic through the use of ports. The available range of port numbers goes from 0 to 65,535. Depending on the type of application, services can listen to incoming requests over TCP or UDP, and sometimes both.
Tags: #ports #network #securitytesting
What Is A Vulnerability?
Before we learn how to search for vulnerabilities, we need to have a solid understanding of what a vulnerability in the world of IT is. According to the European Union Agency for Network and Information Security (ENISA), a vulnerability is “the existence of a weakness in the design or in an implementation that can lead to an unexpected, undesirable event compromising the security of the computer system, the network, the application, or the protocol involved.”
Tags: #vulnerability #C.I.A. #confidentiality #integrity #availability