901 private links
Vous trouverez un guide d'emploi de cette commande, raisonnablement clair, détaillé, bourré d'exemples - malheureusement en anglais - à la page Learn the dd command.
How it works
We evaluate your color combination using the WCAG 2.0 guidelines for contrast accessibility.
If your combination does not meet the guidelines, we find the closest accessible combination by modifying the color lightness.
We modify the lightness value only, in order to stay as true to the original color as possible.
All in one Information Gathering Tools
Well, I was writing a zine about DNS. And at the end of many of my zines, I say "the best way to learn is to experiment! Do weird DNS experiments and see how it works". But I realized that most people, even if they have a domain, probably aren't comfortable doing weird DNS experiments on a domain that's important to them.
So I figured I'd create a domain that's just for playing around (
messwithdns.com
) and let anyone set DNS records on it. You're very encouraged to play around and break things.
Should I Click is a free service to check if a website is safe to access. The great majority of attacks, including targeted attacks, start with a link in an email or chat. When you do not have enough time, or you do not know how to check the URL, should you click on it or not? Our Should I Click service could be helpful for you.
If you received a suspicious link or a website looks weird, Should I Click is the right and easy-to-use tool to analyse if it is safe to click. Should I Click uses a wide range of technologies, including machine learning, statistical analysis and security tools. The aim of this project is to help people at risk around the world (such as Journalists, NGOs, political activists) against targeted cyber attacks. However everyone can use this service.The shouldiclick.org project is a tool created in Civilsphere laboratory (https://www.civilsphereproject.org/) at the Czech Technical University in Prague to help to protect the civil society for free. This project is part of the diploma thesis of František Střasák that will be finished in May 2020.
Free website reputation checker tool lets you scan a website with multiple website reputation/blocklist services to check if the website is safe and legit or malicious. Check the online reputation of a website to better detect potentially malicious and scam websites.
En quoi ça me concerne ?
« Je n'ai rien à cacher. Pourquoi devrais-je me soucier de ma vie privée ? »Tout comme le droit au mariage mixte, le droit de vote des femmes, la liberté d'expression et bien d'autres, notre droit à la vie privée n'a pas toujours été respecté. Dans plusieurs dictatures, ce n'est toujours pas le cas. Nombreux sont nos ancêtres qui se sont battus pour notre droit à la vie privée. La vie privée est un droit humain inhérent à chacun d'entre nous auquel nous avons droit sans discrimination.
Il ne faut pas confondre la vie privée et le secret. Même si on sait ce qui se passe dans la salle de bain, vous fermez quand même la porte. C'est parce que vous voulez une vie privée, et non pas du secret. Tout le monde a quelque chose à protéger. La vie privée est quelque chose qui nous rend humains.
We believe saving passwords in an app, or uploading them all to the cloud, is a recipe for personal disaster.
Why?
Your privacy is your life.
To them, it’s a risk assessment.The only password that can’t be lost, stolen, seized, ransomed or left on the bus, is a password that doesn’t exist.
Spectre is a password app that contains no passwords.
La commande
ss
(pour Socket Statistics) est utilisée sous Linux pour afficher des informations détaillées sur les sockets réseau ainsi que les connexions TCP et UDP.
ss
est fourni par le paquetiproute
, installé sur toutes les distributions Linux.
C'est la commande Ă utiliser en lieu et place denetstat
(paquetnet-tools
) qui est maintenant déprécié.
Logiciel libre de signature de PDF en ligne
A svelte app to display your database from csv to table.
Currently, CryptCheck gives note from G for the worst sites to A+ for the best ones.
Scoring is based on the fact that TLS handshake is not authenticated, and so an attacker can force to use whatever cipher he wants as soon as both client and server support it, with a downgrade attack as simple as modify TCP packets on the fly.
Nous sommes la Fondation Frontière Électronique, un organisme indépendant sans but lucratif qui oeuvre depuis près de 30 ans pour protéger votre vie privée en ligne. Voici Autodéfense contre la surveillance : notre guide spécialisé sur la protection contre l’espionnage en ligne, pour vous et vos amis.
Slint is a toolkit to efficiently develop fluid graphical user interfaces for any display: embedded devices and desktop applications. We support multiple programming languages, such as Rust, C++, and JavaScript.
Yqnnsvg-path-editor Online editor to create and manipulate SVG paths
Online editor to create and manipulate SVG paths
Cartoradio permet, en particulier, d'identifier l'emplacement d' antennes radioélectriques, d'obtenir des informations sur les services qu'elles portent, et de connaître, pour des emplacements donnés, des résultats de mesures de champ électromagnétiques synthétisés dans une fiche de mesures .
Podman Desktop - An open source graphical tool for developing on containers and Kubernetes
Hi. I'm a starter theme called _s, or underscores, if you like. I'm a theme meant for hacking so don't use me as a Parent Theme. Instead try turning me into the next, most awesome, WordPress theme out there. That's what I'm here for.
My ultra-minimal CSS might make me look like theme tartare but that means less stuff to get in your way when you're designing your awesome theme. Here are some of the other more interesting things you'll find here ...
Learn more about me in "A 1000-Hour Head Start: Introducing The _s Theme" on ThemeShaper.
Restic is a modern backup program that can back up your files:
- from Linux, BSD, Mac and Windows
- to many different storage types, including self-hosted and online services
- easily, being a single executable that you can run without a server or complex setup
- effectively, only transferring the parts that actually changed in the files you back up
- securely, by careful use of cryptography in every part of the process
- verifiably, enabling you to make sure that your files can be restored when needed
- freely - restic is entirely free to use and completely open source
A modern, simple TCP tunnel in Rust that exposes local ports to a remote server, bypassing standard NAT connection firewalls. That's all it does: no more, and no less.