• http://ak.jacquielawson.com/product/full/air/3338982/update.xml
  • http://alpine.x10host.com/
  • http://apr.apache.org/
  • http://apr.apache.org/download.cgi
  • http://cppcheck.sourceforge.net/
  • http://e2fsprogs.sourceforge.net/
  • http://httpd.apache.org/
  • http://httpd.apache.org/download.cgi
  • http://jw35.blogspot.co.uk/
  • http://lynx.invisible-island.net/release/
  • http://mmogilvi.users.sourceforge.net/software/oauthbearer.html
  • http://openjdk.java.net/projects/jdk8u/
  • http://www.dettus.net/dhex/
  • http://www.fetchmail.info/
  • http://www.fetchmail.info/security.html
  • http://www.klaus-hartnegg.de/gpo/firefox_changes.html
  • http://www.oracle.com/technetwork/java/javase/downloads/index.html
  • http://www.rdesktop.org/
  • http://www.unbound.net/download.html
  • https://access.redhat.com/blogs/product-security
  • https://archiveofourown.org/series/6448
  • https://asdaddy.com/
  • https://blog.clamav.net/
  • https://blog.juriba.com/windows-10-branching-timeline
  • https://blog.mozilla.org/security/
  • https://blog.mozilla.org/security/category/security/
  • https://blog.qualys.com/ssllabs/2010/10/06/disabling-ssl-renegotiation-is-a-crutch-not-a-fix-2
  • https://blogs.adobe.com/psirt/
  • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960833
  • https://bugs.launchpad.net/ghex/+bug/1851033
  • https://bugs.launchpad.net/ubuntu/+source/qgis/+bug/1850613
  • https://bugs.launchpad.net/~werdnakendal
  • https://bugzilla.mozilla.org/show_bug.cgi?id=1571736
  • https://en-americas-support.nintendo.com/app/social/questions/detail/qid/70607/~/nintendo-devices-and-the-krack-wpa2-vulnerability/session/L3F2LzEvdGltZS8xNTA5NTU0OTEyL3NpZC9mVVl3Y2c2aTd2QkFDRVVrVExxSDJNM3ZmMUQ3YmhJVFUlN0VYbG1zdUtndXY5UWEyZHBGaWNqMGVoR2VWSUtNRWdhWTc5WWlJcllyRkIwSXM4SUVnaEYyeUxQU3FobnZQZ1hYQzVQTUIlN0VqNmh5cTIzWUQ4U0xzZWtnJTIxJTIx
  • https://github.blog/
  • https://github.com/get-iplayer/get_iplayer/releases/latest
  • https://github.com/inflex/ripMIME
  • https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/latest
  • https://github.com/madsen/vbindiff/
  • https://helpx.adobe.com/security.html
  • https://irlpodcast.org/
  • https://launchpad.net/inkscape/+milestones
  • https://metacpan.org/pod/File::Slurper
  • https://metacpan.org/release/grepmail/
  • https://mosh.org/
  • https://newsroom.intel.com/microcode
  • https://newsroom.intel.com/press-kits/security-exploits-intel-products/
  • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080
  • https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh
  • https://security.stackexchange.com/questions/24554/should-i-use-ssl-tls-renegotiation/230327
  • https://sourceforge.net/p/cppcheck/news/
  • https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet
  • https://thisismakepeace.wordpress.com/
  • https://vivaldi.com/download/
  • https://www.asus.com/Motherboards/H87ME/HelpDesk_BIOS/
  • https://www.asus.com/News/V5urzYAT6myCC1o2
  • https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html
  • https://www.devolo.com/support/downloads/download/devolo-cockpit.html
  • https://www.downs-syndrome.org.uk/for-families-and-carers/dual-diagnosis/
  • https://www.downs-syndrome.org.uk/news-category/ascds/
  • https://www.dwiggie.com/derby/2019/AutumnDTheCurse20170225.html
  • https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance.pdf
  • https://www.intel.com/content/dam/www/public/us/en/documents/sa00115-microcode-update-guidance.pdf
  • https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html
  • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
  • https://www.kb.cert.org/vuls/id/228519/
  • https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/
  • https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox/
  • https://www.mozilla.org/en-US/security/known-vulnerabilities/index.html
  • https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/
  • https://www.openssl.org/source/
  • https://www.ordnancesurvey.co.uk/opendatadownload/products.html
  • https://www.rfxn.com/downloads/maldetect-current.tar.gz
  • https://www.smartmontools.org/
  • https://www.stixfonts.org/newsarchive/
  • https://www.varicad.com/en/home/products/download/