Single purpose API
URI Query String/CRUD
API Mashups (3)
A competitor created an export tool for Flickr ex-patriots, so the photo sharing site shut down the Flickr API developer key. The Google Plus developer page makes some wonder if the "real" Google Plus API is coming soon. Also: questions about the Google Safe Browsing API, free cloud database and 15 new APIs.
Have you noticed an increase in the number of reports about malware and compromised web servers? Recently, a computer exploit known as Gumblar has been making news for its ability to launch exploits via drive-by download. Gumblar silently installs itself on a computer if a user simply visits a compromised web site, where it proceeds to steal FTP logins and replace legitimate Google search results with redirects to sites of the attacker's choosing. Despite the threat of Gumblar and malware exploits like it, users of recent releases of the Firefox or Chrome browser have an extra layer of protection provided by their use of Google's Safe Browsing API.
||The Netbeez REST API allows developers to access and integrate the functionality of Netbeez with other applications. Public documentation is not available; API access comes with account service....||Monitoring||12.30.2016|
||The Castle REST API allows developers to access and integrate the functionality of Castle with other applications. Some example API methods include managing users, managing authentication, and...||Security||12.30.2016|
||The Wallarm REST API allows developers to access and integrate the functionality of Wallarm with other applications and websites. Some example API methods include setting up searches, managing users...||Security||12.30.2016|
||The PENTESTON API allows developers to access system security information such as generated reports, targets, and tests provided by the PENTESTON environment. This API requires API Keys for...||Security||12.18.2016|
||PENTESTON is a provider of cloud-based risk assessment solutions for internet security. The platform detects and summarizes data of potential threats to facilitate proactive prevention of cyber...||Security||12.08.2016|