white2hack 📚 – Telegram
white2hack 📚
12.7K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Хорошей практикой является то, что работодатель часто старается стимулировать своих сотрудников "нематераильными бонусами", когда вопрос "цены" уже исчерпан. На твой взгляд, так ли круты эти плюшки и что наиболее эффективно из них лично для тебя?
Anonymous Poll
37%
ДМС, страховка в путешественника, компенсация мед услуг
20%
Оплата парковки, такси до дома вечером, "бесплатные" day off
33%
Фитнес зал, душ, тренажеры на рабочем месте, врач в офисе, массаж за счет компании
7%
Партрнерки, скидки в магазины, дискаунты, ваучеры, подарочные карты
22%
Фрукты, соки, газировки, снэки, печеньки, мороженное, кофе в безлимите
12%
Лаунж зоны, PS5 или XBox, настолыьне игры, "капсулы сна", летние беседки и веранды летом
27%
RSA, RSU, опционы, сниженный % ипотеки, кредита или частичная компенсация проживания\ипотеки
42%
Все х#йня, отдавайте кешем
39%
Оплата обучения, книг, курсов, языковые школы или обучение внутри компании
2%
Свой вариант (пиши в чат)
🤔4🫡2👍1
Source Code Management Platform Configuration Best Practices

Collaborative source code management platforms (such as GitHub and GitLab) play a critical role in modern software development, providing a central repository for storing, managing, and versioning source code as well as collaborating with a community of developers. However, they also represent a potential security risk if not properly configured. In this guide, we will explore the best practices for securing these platforms, covering topics that include user authentication, access control, permissions, monitoring, and logging.

Source

#docs
👍5
Блокчейн: архитектура, криптовалюты, инструменты разработки, смарт-контракты, Имран Башир, 2019

Книга познакомит вас с теоретическими и практическими аспектами технологии блокчейн. Углубленно рассмотрены архитектура блокчейна, децентрализация, симметричное шифрование и шифрование с открытым ключом.

Описаны смарт-контракты и различные блокчейн-платформы, в частности Bitcoin, Ethereum, Hyperledger Fabric. Также уделено внимание инструментам разработки и фреймворкам для работы с децентрализованными приложениями.

#book #crypto
🔥4👍2
Блокчейн_архитектура,_криптовалюты.pdf
33.9 MB
Блокчейн: архитектура, криптовалюты, инструменты разработки, смарт-контракты, Имран Башир, 2019
👍6
Network Security and Cryptography, second Edition, Sarhan M. Musa, Ph.D., 2022

This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security.

It features a new chapter on artificial intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more.

#book #cisco #crypto
👍5
Network Security and Cryptography..pdf
20.3 MB
Network Security and Cryptography, second Edition, Sarhan M. Musa, Ph.D., 2022
👍4
Office 365 Secure Configuration Framework by The National Cyber Security Centre (NCSC), february 2023

This document provides Office365 specific guidance to those implementing the Cyber Security Baseline Standards. The controls & maturity levels described in this document are guidance and, as per the Public Sector Cyber Security Baseline Standards, are intended to create an acceptable security standard and form a broad framework for a set of measures which can be revised over time. The framework model follows a holistic and comprehensive approach to the issues related to Cyber Security which combines the best of various standards to address the needs of key stakeholders.

#windows #hardening #docs
👍3
Office 365 Secure Configuration Framework.pdf.pdf
2.7 MB
Office 365 Secure Configuration Framework by The National Cyber Security Centre (NCSC), february 2023
👍3🔥1
The Software Developer’s Career Handbook by Michael Lopp, 2023

A Guide to Navigating the Unpredictable

At some point in your career, you'll realize there's more to being a software engineer than dealing with code. Is it time to become a manager? Or join a startup? In this insightful and entertaining book, Michael Lopp recalls his own make-or-break moments with Silicon Valley giants such as Apple, Slack, Pinterest, Palantir, Netscape, and Symantec to help you make better, more mindful career decisions.

With more than 40 stand-alone stories, Lopp walks through a complete job lifecycle, starting with the interview and ending with the realization that it might be time to move on. You'll learn how to handle baffling circumstances in your job, understand what you want from your career, and discover how to thrive in your workplace.

#book #job #world
👍4
OReilly.The.Software.Developers.Career.Handbook.pdf
2.8 MB
The Software Developer’s Career Handbook by Michael Lopp, 2023
👍5
Linux permissions control who can access and manipulate files and directories on a system. They are a critical aspect of Linux security and are represented by a series of letters and symbols when you view file listings using the "ls -l" command. Here's a breakdown of Linux permissions:

File Types: The first character in the permission string represents the file type:
-: Regular file
d: Directory
l: Symbolic link
c: Character device file
b: Block device file
p: Named pipe (FIFO)
s: Unix domain socket

Permissions: After the file type character, you have three sets of permissions, each consisting of three characters:
The first set represents permissions for the owner of the file.mThe second set represents permissions for the group associated with the file. The third set represents permissions for others (everyone else)

🔹r: Read permission (viewing the file's content)
🔸w: Write permission (editing or deleting the file)
🔺x: Execute permission (running the file if it's a noscript or binary)

#linux
👍9🔥3
Linux Bash Shell Cheat Sheet

It works with about every distribution, except for apt-get which is Ubuntu/Debian exclusive

#book
👍6
Linux_bash_cheat_sheet_2023.pdf
267.2 KB
Linux Bash Shell Cheat Sheet
👍5
Burp Suite Plugin Development Guide by Joas Antonio Dos Santos

Learn Burp Suite Plugin Development from Scratch. This is a short guide with 8 chapters starting with Hello-World Burp Suite plugin to Creating a plugin with Tabbed UI. This book contains chapters which in detail discusses about What Are Extender APIs, how those Extender APIs can be leveraged to create functionality of your choice.

Official page
The book

#web
👍5