run a @mysterium #vpn node on your #pi and earn #etherium
- https://mysterium.network/node/
- https://my.mysterium.network/node-running-guide
- https://my.mysterium.network/node-running-guide/bounty-rules
stats
run a @mysterium #vpn node on your #pi and earn #etherium
stats
wireguard – yet another open source vpn
WireGuard securely encapsulates IP packets over UDP. You add a WireGuard interface, configure it with your private key and your peers’ public keys, and then you send packets across it. All issues of key distribution and pushed configurations are out of scope of WireGuard; these are issues much better left for other layers, lest we end up with the bloat of IKE or OpenVPN. In contrast, it more mimics the model of SSH and Mosh; both parties have each other’s public keys, and then they’re simply able to begin exchanging packets through the interface.
YOU can help rewire the internet so it’s faster, safer and more accessible for all by using TAILS and MYSTERIUM
Run TAILS BETA
Run a MYSTERIUM ALPHA BLOCKCHAIN VPN node
wow @snyk now automatically creates branches and PRs to fix your @github projects
just connect your @github account to @snyk and they will automatically create PRs to remove vulnerabilities in your code !
pom.xml <dependency> <dependency> <groupId>io.fabric8</groupId> <groupId>io.fabric8</groupId> <artifactId>openshift-client</artifactId> <artifactId>openshift-client</artifactId> <version>1.4.10</version> <version>4.3.1</version> </dependency> </dependency>
top 100 security tools
node electron apps on github
tips
# npm install -g electron # npm install -g electron-packager
then
$ NODE_PATH=/usr/local/lib/node_modules make release
then
an easy to search vulnerability db with detailed information and remediation guidance from @snyksec
example search for zip vulnerabilities
Software Composition Analysis (SCA) apps from @synksec and @whitesourcesoftware
If you want to detect vulnerable dependencies in your GitHub project with snyk you will need to make sure your project has a manifest file so snyk can decide what frameworks you are including.
To get proper test results and create Snyk projects, at least one of the relevant manifest files must be present in the tested folder (CLI), repository (SCM) or app (serverless).
You get a great report showing you issues in your projects
You can also connect Snyk to BitBucket, Docker and GitLab
https://www.redhat.com/en/blog/consistent-security-crypto-policies-red-hat-enterprise-linux-8#
starting with Red Hat Enterprise Linux 8 you may be able to defend against these attacks with our newly introduced system-wide crypto policy. This policy is included with the release of Red Hat Enterprise Linux 8.0 beta.
see also
last nights @linuxinginldn #linuxinginldn #linuxinginlondon #devsecops talks from @skillsmatter on @vimeo
here are the videos
more talks by these speakers