Contribute#

Great that you’re here and want to contribute!

You don’t have to be a security expert to contribute, every contribution is welcome!

  • If you wish to make comments regarding this document, please raise them as GitHub issues. Send comments by email if you are unable to raise issues on GitHub do not to use Github on principle. All comments are welcome!

This playbook is open source.

All contributions are welcome!

The simplest way to make a comment for a specific page is to use the Github icon in the top right.

Missing a great Simple Cyber security solution?#

I love to receive your input!

Tip

Let me know by creating an issue on Github

We have simple rules for before adding your valuable input:

  1. Input MUST BE open. So cc-by licensed for text links and an OSI approved FOSS licensed if you submit a security tool.

  2. Input that refers to commercial offerings that are not open will be rejected. So e.g. patented or ™ solutions are not open. Also security solutions that are consultancy offerings are no recipes that will be added in this playbook. Commercial offerings for this playbook are welcome as ads. See the sponsor page of this playbook. All ads will be incorporated on the sponsor page

When you submit text to which you hold the copyright, you agree to license it under:

  • Creative Commons Attribution-ShareAlike 4.0 International License (“CC BY-SA”) You remain the copyright holder of the text you submit! So no hassle with CLA (Contribute License Agreements).

All contributors will be mentioned in coming release of this guide. If you do not want your name to be included, please let me know!

Our aim is to create a great collection of simple security solutions that solve common cyber security problems. And we understand that simple is very subjective!

Warning

But please note: Only open solutions will be taken into account!