finds you similar websites
auto-suggest    top sites

Nov 10th, 2024

14 Popular Sites Like Usablesecurity

The team has searched the net and found several excellent security and blog sites like Usablesecurity. Take a look and explore other webpages that are related to Usablesecurity.

Displaying 1 to 10 of 500 alternatives to Usablesecurity. (Updated: Nov 10th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Usablesecurity:
  Usable Security
Panel: Usability of Security Software - Is Open Source a Positive, ... July 17, 2009 by Richard Conlan. Moderator: Luke Kowalski, Corporate UI Architect, Oracle ...
http://usablesecurity.com/
popularity:
security
blog
usability
ui
blogs
hci
research
computer
identity
tech
new search by a custom tag signature
  Krebs on Security
No information avaiable
similarity:
popularity:
security
blog
blogs
computer
news
virus
tech
info
krebs
forensics
  Marcus J. Ranum
5/2009: Schneier and Ranum Face Off. Techtarget interviewed Bruce and myself ... Ranum's Rants. I'm blogging periodically about security on Tenable's blog. ...
similarity:
popularity:
security
blog
reference
blogs
geek
computer
unix
photography
people
networking
  TaoSecurity
OpenPacket-users Mailing List https://lists.sourceforge.net/lists/listinfo/openpacket ... TaoSecurity Blog http://taosecurity.blogspot.com. Welcome! C'mon in. ...
similarity:
popularity:
security
blog
network
blogs
freebsd
infosec
networking
sysadmin
bsd
linux
  Google Online Security Blog
News and insights from Google on security and safety on the Internet. ... Posted by Alma Whitten, Software Engineer, Security & Privacy Teams ...
similarity:
popularity:
security
google
blog
internet
blogs
malware
research
web
hacking
computer
  invisiblethings' blog
VM escapes, hypervisor compromises (via "classic" rootkits, as well as Bluepill ... The training offers quite a unique chance, I think, to absorb the results of 1 ...
similarity:
popularity:
security
blog
hacking
blogs
malware
rootkits
research
virtualization
hack
software
  root labs rdist
This is possible because Android doesn't place any restrictions on native code ... The only limitation is that the code runs as the app's unprivileged UID, but ...
similarity:
popularity:
security
blog
blogs
crypto
cryptography
linux
software
research
computers
opensource
  Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
  Security to the Core | Arbor Networks Security Blog
Effectively Completing the Attack (and this posting) ... This is a Flickr badge showing public photos from arbor.asert. Make your own badge here. ...
similarity:
popularity:
security
blog
network
research
blogs
hacking
arbor
news
networking
vendor
  worm blog
I know Wormblog has been very, very silent lately as I've been ... Wormblog is a project to collect and share links about worm related ... Wormblog was ...
similarity:
popularity:
security
blog
worms
virus
blogs
research
worm
malware
hacking
programming
  Security Absurdity
No information avaiable
similarity:
popularity:
security
blog
hacking
tech
news
sysadmin
internet
information
interesting
computer
1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.