finds you similar websites
auto-suggest    top sites

Jun 28th, 2024

12 Popular Sites Like Securosis

We have rummaged through the internet and spotted several striking security and blog sites like Securosis. So come and explore more sites that complement Securosis.

Displaying 81 to 90 of 500 alternatives to Securosis. (Updated: Jun 28th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Securosis:
  securosis.com
The Business Justification for Data Security. Building a Web Application Security Program. Securosis: On Holiday. Database Security: The Other First Steps ...
http://www.securosis.com/
popularity:
security
blog
technology
mac
sysadmin
networking
network
osx
infosec
blogs
new search by a custom tag signature
  阿碼外傳-阿碼科技非官方中文 Blog
惡意的PDF檔案一點都不是新聞,過去 doc、flash 以及圖片等都已經被大量利用在 PC 的感染中,但前一陣子在日本以及各地頻傳的事件 (1,2) 顯示,才 ... 這次利用的攻擊瀏覽器方式稱為 JSRedir-R,它其實是一種攻擊方式的通稱,在友廠的分類說明中可以見到它是利用 PDF, Flash/SWF 的漏洞來讓瀏覽器, ...
similarity:
popularity:
security
blog
其他
tech
free
network
  Macintosh Security Site - Security for Mac Platform MacOS X Security Firewalls Desktop Network Security secure mac os x Virus Encrpytion PGP macosx
Devoted to Apple Macintosh security issues. Offers news, software reviews, and MacScan software for detection and removal of spyware in the Classic Mac OS and OS X.
similarity:
popularity:
security
mac
osx
apple
macosx
software
macintosh
news
reference
tools
  Home - The Community's Center for Security
LinuxSecurity.com delivers the latest breaking news and information on security, linux, open source, firewalls, networks, privacy, encryption, cryptography, hacks, ...
similarity:
popularity:
linux
security
news
sysadmin
network
administration
opensource
networking
howto
computer
  Intrusion Prevention IPS | Network Access Control NAC | TippingPoint | Home
Provider of network platform and open development environment infrastructure services.
similarity:
popularity:
security
ips
ids
network
networking
intrusion
hardware
sysadmin
software
resources
  Daring Fireball
Mac nerdery and general web curmudgeonry, by John Gruber.
similarity:
popularity:
blog
mac
apple
blogs
tech
osx
design
technology
news
macintosh
  Didier Stevens
I did some research and discovered that Adobe implemented a blacklist ... but that the blacklisting functionality identifies the file type of "cmd.exe" as. ...
similarity:
popularity:
security
blog
forensics
hacking
pdf
blogs
windows
malware
computers
research
  SecViz | Security Visualization
This is the place to share, discuss, challenge, and learn about security data visualization, log visualization, and IT data visualization.
similarity:
popularity:
security
visualization
tools
analysis
monitoring
graphs
network
blog
graphics
sysadmin
  [lcamtuf.coredump.cx]
Click here for sample chapters, plenty of reviews, and other useful information. ... NEW Interesting vulnerabilities: exploitable DOM fuzzing crashes in multiple ...
similarity:
popularity:
security
hacking
programming
tools
network
software
people
blog
linux
geek
  SGUIL - The Analyst Console for Network Security Monitoring.
your description goes here ... Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil's main component is an ...
similarity:
popularity:
security
monitoring
network
ids
snort
software
tools
networking
opensource
sysadmin
  Setting up firmware password protection in Mac OS X
Setting up firmware password protection in Mac OS X. Last Modified: June 26, 2009 ... You can use the Open Firmware Password application to set up low-level password ...
similarity:
popularity:
security
mac
osx
password
firmware
apple
hardware
howto
macosx
protection
< prev 1 ... 7 8 9 10 11 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.