Fix conflict in sources

This commit is contained in:
Herman Slatman 2016-04-04 19:44:40 +02:00
commit 411046f6d5

View File

@ -117,8 +117,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
</tr> </tr>
<tr> <tr>
<td> <td>
<a href="https://strongarm.io" <a href="https://strongarm.io" target="_blank">Strongarm, by Percipient Networks</a>
target="_blank">Strongarm, by Percipient Networks</a>
</td> </td>
<td> <td>
Strongarm is a DNS blackhole that takes action on indicators of compromise by blocking malware command and control. Strongarm aggregates free indicator feeds, integrates with commercial feeds, utilizes Percipient's IOC feeds, and operates DNS resolvers and APIs for you to use to protect your network and business. Strongarm is free for personal use. Strongarm is a DNS blackhole that takes action on indicators of compromise by blocking malware command and control. Strongarm aggregates free indicator feeds, integrates with commercial feeds, utilizes Percipient's IOC feeds, and operates DNS resolvers and APIs for you to use to protect your network and business. Strongarm is free for personal use.
@ -133,6 +132,14 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
The emphasis of ThreatMiner isn't just about indicators of compromise (IoC) but also to provide analysts with contextual information related to the IoC they are looking at. The emphasis of ThreatMiner isn't just about indicators of compromise (IoC) but also to provide analysts with contextual information related to the IoC they are looking at.
</td> </td>
</tr> </tr>
<tr>
<td>
<a href="https://virusshare.com/" target="_blank">VirusShare</a>
</td>
<td>
VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of malicious code. Access to the site is granted via invitation only.
</td>
</tr>
</table> </table>
## Formats ## Formats