35 skills found · Page 1 of 2
TechForPalestine / Boycott Israeli Tech Companies DatasetNo description available
yaqiin / BoycottA Web platform that promote ethical consumerism by providing alternatives to non-ethical products.
boycott-fuck-xuexiqiangguo / Boycott Fuck XueXiQiangGuo针对使用Fuck-XueXiQiangGuo学习强国刷分软件作弊的人士的最后通牒!
TechForPalestine / Boycott Israeli Consumer Goods Datasetgolden source for combining boycott data + alternatives
TheBSD / Poykott Oldboycott Israeli companies and services
cjh0613 / Anti Selfish BrowserBoycott IE and other selfish browsers, supports 105 languages.当IE访问网站的时候将自动跳转到升级提示页面。 检测到其他中国内地流氓浏览器访问,弹框提示更换。
petrussola / Boycott Brands Supporting WarChrome extension that highlights products sold by companies that refuse to exit the Russian market. By continuing to pay taxes in Russia, they implicitly support the war in Ukraine. Available in most online supermarkets in Ireland, Poland, Romania, Slovakia, Spain and UK. Please let me know if I am missing any
EvanCarroll / Awesome Opensource Boycott Divestment SanctionsA curated list of reasonable and humane people that support the objectives of the Boycott Divestment Sanctions (BDS) movement.
FreePalestine1948 / BoycottYour go-to source for information and resources on companies that support Israel, and how to effectively boycott them. Get informed, get active, and join the movement for Palestinian rights.
boycott4 / BoycottSite to list boycotted companies and individuals
IbrahimMohammed47 / Boycott ZNo description available
TalelMejri / BoycottAppNo description available
MadhavSingh2236 / Classify Websites Into Amiable Or Malicious Using Raw DataWith WWW being the global platform, various fields inclusive to the same have emerged until hitherto. Due to ever-changing forms of cyber Security, it has become a necessity to classify Malicious websites so as to secure personal content. In this project we have implemented The State-Of-the-Art Decision Tree Machine Learning Models such as Random Forest and Decision Tree to classify URLs as malicious or amiable. Implementation of Classification algorithms for discrete data as well as normal regression model is used in the project. Malevolent URLs have been broadly used to mount different digital assaults including spamming, phishing and malware. Recognition of malignant URLs and distinguishing proof of danger types are basic to upset these assaults. Knowing the sort of a danger empowers assessment of seriousness of the assault and embraces a viable countermeasure. Existing strategies commonly distinguish vindictive URLs of a solitary assault type. In this paper, we propose technique utilizing AI to identify malevolent URLs of all the mainstream assault types. While the World Wide Web has become a stellar application on the Internet, it has likewise gotten a massive danger of digital assaults. Enemies have utilized the Web as a vehicle to convey malignant assaults, for example, phishing, spamming, and malware contamination. For instance, phishing ordinarily includes sending an email apparently from a dependable source to deceive individuals to click a URL (Uniform Resource Locator) contained in the email that joins to a fake page. To address Web-based assaults, an incredible exertion has been coordinated towards identification of noxious URLs. A typical countermeasure is to utilize a boycott of vindictive URLs, which can be built from different sources, particularly human criticisms that are exceptionally precise yet tedious. Boycotting acquires no bogus positives, however is successful just for known noxious URLs. It can't identify obscure malevolent URLs. The very idea of careful match in boycotting these renders it simple to be sidestepped. This shortcoming of blacklisting has been tended to by oddity-based location techniques intended to identify obscure vindictive URLs. In these strategies, a characterization model dependent on discriminative principles or highlights is worked with either information from the earlier or through machine learning. Choice of discriminative standards or highlights assumes a basic function for the presentation of a locator. Online malware assaults become one in everything about chief genuine dangers that need to be tended too frantically. Numerous methodologies that have stood out as promising manners by which of safeguard work, for example, malware grasp utilizing various boycotts. Nonetheless, these standard methodologies ordinarily neglect to watch new assaults due to the adaptability of malignant sites. Consequently, it's hard to deal with state-of-the-art boycotts with data concerning new vindictive sites. Malignant location identification assumes a significant part for a few network protection applications, and unmistakably AI moves toward square measure a promising course. In mix with protection imperatives on information sets of real client traffic, its irksome for scientists and product engineers to measure hostile to malware arrangements against huge scope information sets of practical net traffic. AI strategy [1] region unit utilized so as to characterize the online deals into malignant and benevolent URLs. The appearance of ongoing correspondence innovations has had enormous contact with in the development and advancement of organizations spamming over a few applications just as web based banking, online business, and long range informal communication. In actuality, in the present age it's almost required to have a web presence to run a famous endeavour. Accordingly, the significance of the overall net has ceaselessly been expanding. Unfortunately the mechanical promotions return in expansion to new unobtrusive strategies to assault and trick client. Such assaults grasp noxious sites that sell fake stock, financial extortion by fooling clients into uncovering delicate data that in the long run cause stealing of money or character, or maybe placing in malware inside the clients framework. There square measure a huge kind of procedures to actualize such assaults, similar to explicit hacking attempts, Derive-by abuses, Denial of administration [2], Distributed refusal of administration [1] and bunches of others. Concentrating the changeability of assaults, without a doubt new assault assortments, and furthermore the unnumbered settings inside which such assaults will appears, it's exhausting to style-solid frameworks to find digital security penetrates. The restrictions of customary security the board advancements are getting to an ever increasing extent genuine given this remarkable development of new security dangers, fast changes of new IT advancements, and critical deficiency of security experts. The vast majority of these assaulting strategies are acknowledged through spreading traded off URLs. A primary exploration exertion in pernicious URL recognition has zeroed in on choosing profoundly successful discriminative highlights. Existing techniques were intended to distinguish pernicious URLs of a solitary assault type, for example, spamming, phishing, or malware. In this paper, we propose a strategy utilizing Machine Learning Algorithms on how to distinguish malevolent URLs of all the well known assault types including phishing, spamming and malware contamination, and distinguish the assault types noxious URLs endeavour to dispatch.
Dan6erbond / Cheeri NoSay no to those pesky corporate overlords!
z0ligit / Kormany Media Boycott FilterNo description available
lucifer1004 / BoycottA map app.
koo5 / Koordinator2000crowd-defunding
theWallProject / MonoThis is the monorepo that contains the addon and it's data.
happysegfault / BoycottusaList of US products to boycott, and non-US alternatives. Made in response to Trump's trade war against his allies.
U77w41 / Twitter Boycottbollywood Trend AnalysisNo description available