Login
Discover
Waves
Decks
Plus
Login
Signup
Topics
New
Trending
Hot
New
New
Trending
Hot
New
Payouts
Muted
Promoted
Global
Top communities
Create decentralized community
latest #it-security created topics on internet
louis88
it-security
2024-05-25 21:54
How a Steam Deck Runs Kali Linux and the Dark World of Zero-Day Exploits
I recently watched a video by the renowned YouTuber David Bombal, and I must say, it was an exhilarating experience. He showcased how to install Kali Linux on a Steam Deck, transforming it into a fully
$ 14.929
181
t-nil
misc
2021-05-19 15:24
Permissions of Chrome 'Hive Keychain' add-on
Well, I just created my Hive/PeakD account, and I have to say, its not really a good thing that this key management add-on requires 'Permission to read and change all data on all websites you visit'. You
$ 26.262
21
5
aawisdom.com
it-security
2019-11-21 06:45
Some Hacks Exploited Hmailserver
Hacks figured out how to exploit hmail servers recently and turn them into spamming machines very recently!
$ 0.000
0
aawisdom.com
hollywood-lies
2019-11-18 03:35
Stupid Lie of Movies
I saw Angel has Fallen, 2019 movie. A guy said, “see if there is an IP address from a Salient Global in Virginia”. Real hackers do not use their real IP. A hacker of that caliber will use VPN 100% certain.
$ 0.000
4
darth-azrael
photography
2026-04-03 16:59
Promoted
Vintage Photos - Lot 6 (190-193)
The photos in this set were takin in Michigan between 1957 and 1967.
$ 0.096
42
seo-boss
seo
2019-05-09 11:08
Joom
Hell
$ 0.882
37
1
jeannedarc
deutsch
2019-04-27 13:27
Rettet Omas Computer
IT is key! Nein, ihr seid jetzt nicht in meinem Werbeblock gelandet. Aus gegebenem Anlass und weil ich es in meinem Artikel "Join the TEC Club" versprochen hatte, nehme ich mir heute mal die
$ 0.154
313
4
darkstar-42
deutsch
2019-03-13 08:41
Cyber Security Rumble
In ca 20 Minuten beginnt die online Qualifikation zum Cyber Security Rumble Germany. Alle Studenten können sich unter anmelden. Wer es ins Finale schafft kann auch etwas gewinnen: Eine Reise zur Security
$ 0.000
8
darkstar-42
deutsch
2019-03-01 08:11
CSCG19 Online Qualifikation: Der erste Monat die ersten Aufgaben
Cyber Security Challenge Germany 2019 Online Qualifying 14 bis 20 Jahre AufgabentypNameSchwierigkeitsgrad Networking3045 Find the Tunnelmedium Malware/Android4282 Red Alert Malwareeasy Web Security7820
$ 0.024
4
1
binanceinsides
crypto
2026-03-26 21:40
Promoted
Crypto Pump Signals for Binance: Insides about the upcoming increase in the value of coins
AI-powered crypto pump signals for Binance: Real-time altcoin alerts, accurate exit targets seamless trading automation
$ 0.304
13
3
darkstar-42
it-security
2019-02-27 12:55
Die CSCG19 Online Qualifikation startet in wenigen Tagen
Um direkt loslegen zu können wäre jetzt der richtige Zeitpunkt alle Tools auf den neuesten stand zu bringen. Anmelden könnt ihr euch unter
$ 0.029
8
1
rodrigokroll
bro
2019-02-03 14:06
Bro IDS IP-based global whitelist for bro scripts
A Bro module that defines an IP-based global whitelist configuration file for all your bro scripts.
$ 0.000
2
2
jeannedarc
deutsch
2019-01-08 19:23
Under Obama: US Became World’s Mega-Hub for Pedophilia
Heute komme ich euch mit einem sehr unerfreulichen Thema. Ich bringe das auf Steemit, damit niemand später sagen kann:“Ich habe nichts davon gewusst“. Vielleicht täusche ich mich – wie so oft – aber vielleicht
$ 0.065
41
7
uruguru
deutsch
2018-12-15 18:48
Top-5 IT Security Trends in 2018
Das Internet und die IT sind wichtige Hilfsmittel, die heute nicht mehr wegzudenken sind. Das gilt insbesondere für Unternehmen, die Buchhaltung, Bestellbearbeitung, E-Mail Verkehr, etc. über das World
$ 0.073
8
8
anna.kathaxrina
Liketu
2026-03-28 17:01
Promoted
The Subtle Art of Not Explaining
Not everything needs an explanation. Not every decision requires approval. There is something deeply liberating in choosing your path and letting it stand on its own. I used to feel the need to justify
$ 0.328
43
3
lappen
cryptomator
2018-09-22 18:12
Videoanleitung Cryptomator
Videoanleitung für das Tool Cryptomator. Mit Cryptomator können Sie ihre Daten verschlüsselt in der Cloud ablegen. ▶️ DTube ▶️ IPFS
$ 0.000
1
security101
penetrationtesting
2018-05-21 09:07
[EN] Theoretically Penetrationtesting #1
In this small series I would like to give a short introduction to the theoretical procedure of penetration tests. This series is divided into the following contributions: #1 What is penetration testing,
$ 18.793
39
technotroll
deutsch
2018-05-17 06:19
7. IT Sicherheitskonferenz in Stralsund || Summary
Hallo liebe Steemians, wie einige am Dienstag schon entdeckt haben, fand an den beiden vergangenen Tagen bei uns an der Hochschule die 7. IT-Sicherheitskonferenz statt. Viele namhafte Unternehmen haben
$ 0.141
16
3
security101
it-security
2018-05-05 15:08
[EN] Linux file permissions - SUID
File permissions are a basic concept in Linux systems to manage permissions to write, read and execute files. In this article I would like to limit myself to a less common file right - the SUID-bit. By
$ 9.611
40
4
toffer
SkateHive
2026-04-01 05:29
Promoted
Palm Sunday 2026
Last Sunday, we decided to attend a mass for Palm Sunday of this Holy Week 2026. Since the Cathedral was a few meters away from our house, we just decided to take a walk because of the bumper-to-bumper
$ 0.540
97
1
otenmoten
it-security
2018-04-10 15:32
Software for lock up a disk (HDD/SDD)
Hey community, is there any software on the market which isn't already decoded by government?
$ 0.000
5
3
erwin-muc
cybersecurity
2018-04-10 10:42
BSides Munich IT Security Conference (yesterday)
Thanks a lot to the team! It was a fun and learning event. Thanks also to our sponsors, especially Microsoft, for the excellent venue and superb lunch. There was a lot about the human factor in InfoSec
$ 0.000
1
1
security101
it-security
2018-03-31 10:02
[EN] Bufferoverflow - Theoretical part
In a buffer overflow or buffer overflow, data that is often read in as user input is written to a memory area that was not intended for this purpose. As larger amounts of data are read in than actually
$ 11.123
15
anth0rx
docker
2018-03-30 09:56
Vergleich von Sicherheits-Analysetools für Docker
Zu Zeiten der Cloud wird immer mehr auf Microservices umgestellt. Anwendungen laufen innerhalb isolierter Container, um Deployment und Management zu vereinfachen und sie sicherer zu machen. In der Arbeit
$ 4.404
133
3