start new:
tmux
start new with session name:
tmux new -s myname
| INTRO | |
| I get asked regularly for good resources on AWS security. This gist collects some of these resources (docs, blogs, talks, open source tools, etc.). Feel free to suggest and contribute. | |
| Short Link: http://tiny.cc/awssecurity | |
| Official AWS Security Resources | |
| * Security Blog - http://blogs.aws.amazon.com/security/ | |
| * Security Advisories - http://aws.amazon.com/security/security-bulletins/ | |
| * Security Whitepaper (AWS Security Processes/Practices) - http://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf | |
| * Security Best Practices Whitepaper - http://media.amazonwebservices.com/AWS_Security_Best_Practices.pdf |
| credentials.yml |
The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.
I welcome contributions and comments on the information contained. Please see the How to Contribute section for information on contributing your own knowledge.
| " vimrc file for following the coding standards specified in PEP 7 & 8. | |
| " | |
| " To use this file, source it in your own personal .vimrc file (``source | |
| " <filename>``) or, if you don't have a .vimrc file, you can just symlink to it | |
| " (``ln -s <this file> ~/.vimrc``). All options are protected by autocmds | |
| " (read below for an explanation of the command) so blind sourcing of this file | |
| " is safe and will not affect your settings for non-Python or non-C files. | |
| " | |
| " | |
| " All setting are protected by 'au' ('autocmd') statements. Only files ending |
| #! /usr/bin/env python3 | |
| import argparse | |
| from phue import Bridge | |
| def main(bridge_ip): | |
| bridge = Bridge(bridge_ip) | |
| api = bridge.get_api() | |
| lights = api['lights'] | |
| for light in lights: |
Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)