finds you similar websites
auto-suggest    top sites

May 9th, 2024

11 Popular Sites Like Cisecurity

Our team has rummaged through the web and identified tons of first-class security and hardening sites like Cisecurity. Stop on by and view other webpages that are similar to Cisecurity.

Displaying 61 to 70 of 500 alternatives to Cisecurity. (Updated: May 9th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Cisecurity:
  Center for Internet Security - Standards
The Center for Internet Security is a non-profit enterprise that helps organizations reduce the risk of business and e-commerce disruptions resulting from inadequate ...
http://cisecurity.org/
popularity:
security
hardening
internet
reference
tools
windows
linux
network
standards
software
new search by a custom tag signature
  Security Engineering - A Guide to Building Dependable Distributed Systems
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...
similarity:
popularity:
security
book
books
reference
engineering
network
computer
free
programming
ebook
  Penetration Test
... DBA_USERS WHERE US ERNAME='SYS')||'.vulnerabilityassessment.co.uk') FROM DUAL; ... DBA_USERS WHERE USERNAM E='SYS')||'.vulnerabilityassessment.co.uk') FROM DUAL ...
similarity:
popularity:
security
hacking
pentest
reference
penetration
tools
tutorial
howto
network
hack
  Darik's Boot and Nuke (Hard Drive Disk Wipe)
Self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, also prevents or thoroughly hinders all known techniques of hard disk forensic analysis.
similarity:
popularity:
security
software
tools
utilities
wipe
utility
erase
linux
sysadmin
computer
  Firewall Test, Web Tools and Free Internet Security Audit
Test your firewall and audit your website with these free online tools for webmasters and home users. ... © 1999-2008 Audit My PC .com, All rights reserved. ...
similarity:
popularity:
security
tools
firewall
internet
test
computer
spyware
web
utilities
software
  OpenVAS - OpenVAS - Open Vulnerability Assessment System Community Site
OpenVAS Compendium 1.0.1. PDF (en) PDF (de) NVT Lookup by OID ... and to report bugs to the OpenVAS bug tracker located at http://bugs.openvas.org ...
similarity:
popularity:
security
opensource
vulnerability
tools
scanner
network
nessus
software
sysadmin
linux
  Windows security tools and information - ntsecurity.nu
Advanced freeware Windows security tools and information. ... News from ntsecurity.nu. News from vidstrom.net © Arne Vidstrom. All rights reserved. ...
similarity:
popularity:
security
windows
hacking
tools
networking
software
freeware
hack
network
forensics
  Qualys, Inc. - On Demand Vulnerability Management and Policy Compliance
Qualys, Inc. provides on demand vulnerability management and policy compliance solutions help ... Laws.Qualys.com. Top 10 Vulnerabilities. More Security Alerts ...
similarity:
popularity:
security
vulnerability
tools
software
network
compliance
saas
testing
pentest
networking
  CipherDyne: Linux Security, iptables Log Analysis, iptables Policy Analysis, and Intrusion Detection
Cipherdyne System and Network Security ... cipherdyne.org. Michael Rash, Security Researcher. Home. Blog Archives. Software. Author ...
similarity:
popularity:
security
linux
firewall
network
software
tools
iptables
netfilter
sysadmin
tool
  Gray-World.net Team
GRAY-WORLD.NET TEAM. Unusual firewall bypassing techniques, network and computer security. ... IRC://irc.gray-world.net:6677/gray-world.net. CHANGELOG, MIRRORS, LEGAL ...
similarity:
popularity:
security
firewall
network
tunneling
tools
hacking
software
networking
linux
hack
  National Vulnerability Database Home
Comprehensive CVE vulnerability database that integrates all U.S. Government publicly available vulnerability resources. ...
similarity:
popularity:
security
vulnerability
database
reference
government
hacking
vulnerabilities
computer
tools
internet
< prev 1 ... 5 6 7 8 9 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.