There are 1 repository under security-policy topic.
SELinux Reference Policy v2
🎫 It's a kind of a digital business card including my projects thumbnails, codes, links to my social medias and a dark mode view option button .
SELinux Reference Policy v3 pre-alpha
:lock: A powerful PHP data desensitization tool with built-in rich desensitization calculation rules, supports dynamic authorization desensitization based on security policies.
Update_Full [UNIX] is a Free & Open-Source script written with POSIX compliance that allows for simple, customisable, and full updating of a wide variety of popular UNIX distributions through their respective package managers.
Build Iframe. Ignore X-Frame-Options, Content-Security-Policy, X-Content-Type-Options, X-Xss-Protection etc.
Default Community Health File: We at Ghetto Geekk LLC prioritize our clients over our profits, but we also care about the saftey, security, health, well-being, growth & prosperity of each individial on our teams. This extends to our families, our communities, our environment, & the world. This firmly empower the right to identify themselves as they see fit. We are diverse & inclusive to all. In keeping w/ our technology industry's best practices. This repo has been created for our default community health files, (such as CONTRIBUTING, FUNDING.yml, Issues / pull request, templates, config.yml SUPPORT.md, SECURITY.md, & CODE_OF_CONDUCT. Default files will be used for any repository owned by Ghetto Geek LLC, that does not contain its own file of that type.
📃️🛡️📄️ Security information for @seanpm2001
This is a GitHub repository template. By using this template to create a repository, you can easily meet the requirements of the Community Standards.
Centrally manage AWS, GCP and self-managed servers and connect to them via SSH. Update security group, access control list, firewall and security policy rules with your new IP.
Explore my portfolio showcasing projects in data engineering, cybersecurity, software development, and cloud computing. Highlights include SQL tutorials, automation tools, cybersecurity assessments, and innovative Python applications. Dive into my work and see my expertise in action.
Risk assessment report analyzing Instagram's security measures, vulnerabilities, and risk mitigation strategies. Includes information classification, IT security plans, implementation steps, and security awareness training to enhance platform safety.
Some scripts to allow VMs to be moved to a blank NSX Manager, moving their tags, sec groups and rules
Orenburg State University laboratory works for InfoSec
Preventing sensitive data from being pushed to a repository | Removing traces of the sensitive data | GitHub vulnerability alerts| Fixing vulnerable dependencies | Security policy | .gitignore | Tracing sensitive data
Trusted Execution Environment for Mobile Code
Official security policy for Tidsbanken AS. Guidelines and instructions for disclosing vulnerabilities responsibly.
Sahip olduğunuz veya yayınladığınız her şey için tek bir medya oynatıcı; ister müzik ister video olsun, çevrimiçi veya çevrimdışı Rise Media Player hepsini yapıyor. Ve WinUI'nin en son sürümüyle güzel ve yerel.
Security and PKI/PGP - Please see the security repo instead