unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Assume breach design
There is much discussion around Zero Trust Architecture (ZTA), but it seems the concept of Assume Br...
2024-10-13 16:1:45 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
dmz
network
zta
security
paradigm
ICS/OT/IoT Security: challenges and protection strategies
It’s time to revisit the ICS/OT world, as it has unique characteristics that influence its processes...
2024-9-7 01:31:40 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
security
network
lifespan
nac
Network outage
In 2013, I presented a critical case that could cause a complete isolation of a datacenter. Eleven y...
2024-7-31 15:1:55 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
fabric
switches
blade
chassis
network
UNetLab v3 development series
Join me as I embark on an exciting journey to develop UNetLab v3! On this Patreon series, you’ll get...
2024-7-29 23:2:23 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
network
unetlab
patreon
exclusive
development
Ansible automation series
Welcome to our series focused on Ansible Automation! In this comprehensive series, we’ll delve into...
2024-7-29 23:2:22 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
planned
network
proficient
patreon
incredibly
Nautobot automation series
Welcome to our Patreon-exclusive series on Nautobot Automations! If you’re an IT professional, netwo...
2024-7-12 18:31:43 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
network
nautobot
patreon
exclusive
streamline
Palo Alto Firewall as Code
It has been about 6 years since the Automate IT² event organized by me and Gabriele Gerbino. During...
2024-6-22 21:16:35 | 阅读: 22 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
security
firewalls
python
architects
pan
On the other side of the Firewall
This book originates from the authors’ experience in conducting security incident simulations within...
2024-6-12 02:1:44 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
security
ciso
dialogues
exercises
simulations
The cost of complexity: Ansible AWX
For several years now, Ansible AWX has been on my ToDo list. I have always postponed dealing with it...
2024-5-5 21:16:33 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
awx
kubernetes
minikube
playbook
pylibssh
Opt-out from Web Archive
Web Archive is an online service (non-profit) that has long been recording various websites by archi...
2024-4-29 18:16:36 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
robots
removal
requesting
deletion
disallow
Ansible Workbook
Network automation arises as a necessity to reduce and enhance operability, standardize working meth...
2024-4-27 15:16:35 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
workbook
network
eve
governance
grc
Self-Hacking: How I learned to love the Cold again
Alright, here’s how I got back into (loving) the cold, and why I did it.Normally, I don’t spill much...
2024-4-27 04:31:57 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
cold
water
daniele
warm
pain
EVE-NG Workbook (Amazon Kindle)
read file error: read notes: is a directory...
2024-4-26 02:46:41 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
eve
network
workbook
automations
development
Cybersecurity: fashion or strategy
I couldn’t find a suitable title for this post, in which I try to gather various ideas that have com...
2024-4-11 14:1:35 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
ciso
impulse
security
strategic
Attempted fraud via SMS and fake voice
This post recounts an attempt at fraud via SMS and voice call with a fake voice, targeting an elderl...
2024-3-27 20:16:23 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
cellphone
attacker
referred
hereafter
anomalies
Installing EVE-NG
The first step to work in the IT field today is to set up a laboratory. EVE-NG (formerly UNetLab) ca...
2024-3-27 20:1:37 | 阅读: 51 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
eve
machine
network
hardware
username
Installing Ansible
Ansible is distributed as a Python module installable via PIP. The installation process is straightf...
2024-3-23 15:32:16 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
python
venv
installable
tgz
playbooks
One-time commands on Cisco IOS with Ansible
In this article, we present an initial example of executing mass commands using Ansible on Cisco IOS...
2024-3-17 19:16:28 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
ssh
libssh
hellman
diffie
network
Theft and recovery of a Facebook account
This is the story of Vittoria (a pseudonym, henceforth referred to as V). A few days ago, V called m...
2024-3-16 21:46:39 | 阅读: 22 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
facebook
attachment
security
criminal
Task and process automation
I have been involved in automation since around 2004, when I was managing nearly 200 nodes on the Al...
2024-3-16 21:1:27 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
network
approved
automating
chose
routers
Previous
-27
-26
-25
-24
-23
-22
-21
-20
Next