(2018) 12 best practices for user security

This commit is contained in:
Morgan 2018-02-01 16:09:09 +01:00 committed by GitHub
parent fea7877690
commit 58bd950db0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -3349,6 +3349,7 @@ Raw
* [David Gilbertson](https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5) - (2018) Im harvesting credit card numbers and passwords from your site. Heres how. * [David Gilbertson](https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5) - (2018) Im harvesting credit card numbers and passwords from your site. Heres how.
> If an attacker successfully injects any code at all, its pretty much game over > If an attacker successfully injects any code at all, its pretty much game over
* [Michael Kwaku Aboagye](https://opensource.com/article/18/1/securing-linux-filesystem-tripwire) - (2018) Securing the Linux filesystem with Tripwire * [Michael Kwaku Aboagye](https://opensource.com/article/18/1/securing-linux-filesystem-tripwire) - (2018) Securing the Linux filesystem with Tripwire
* [Ian Maddox](https://cloudplatform.googleblog.com/2018/01/12-best-practices-for-user-account.html) - (2018) 12 best practices for user account, authorization and password management
## GPG ## GPG
* [Charles Zachary Lockhart](http://irtfweb.ifa.hawaii.edu/~lockhart/gpg/) - GPG Cheat Sheet * [Charles Zachary Lockhart](http://irtfweb.ifa.hawaii.edu/~lockhart/gpg/) - GPG Cheat Sheet