blog


About the blog category (1)
Linux Without Borders, Edition 1 (Nov 2017): network-ergonomics and cloud-mounts for the impatient (1)
Program Analysis with Satisfiability Modulo Theories (SMT) Solvers for Bug Hunters - Part 1 (1)
Darktrace - Machine Learning Network Intrusion Detection System (1)
GDPR FAQs - from DPIA (Article 25) to Data Mapping (Article 30, 32) (1)
PWNplug - onsite Pen(-)tests, Reverse Shells, and Network Access Control (1)
How did you cultivate information security at your company - or why certification isn't about applicants (1)
SSH Multi Factor Authentication with Google Authenticator from external networks (1)
iSCSI, LUNs, arrays - OpenSource storage with Linux and tgt (1)
Use FreeTDS on Linux and Python for Lansweeper Asset Management queries (1)
Did you ever use the word "crypto-compliance" for PCI DSS? Maybe you should (1)
The role of risk assessments and evaluation of evidence in Incident Response (1)
Install suricata 3 on Gentoo via Portage with an external libhtp (1)
Malware Analysis - basic code analysis with BinNavi (1)
Security Awareness training: use cultural awareness and cognitive systems to message the audience (1)
Fix Drupal 7 if there are ctools functions missing, but the module is in the web root in modules (1)
Threat Feeds to feed the needs - ThreatPinch and Splunk / Sumo Logic / Web frontends for logging (1)
My top 5 eLearning video courses for Q1 2017 (1)
MSDN - benefits via Visual Studio Pro (1)
Laptop review: a 13" Big Bertha for Big Data - Dell / Alienware 13" R3 OLED (2)
News from the Cloud9 IDE: We Go now (1)
Project Alexandria - next-gen learning through personal searching (1)
Is Glasswire snakeoil? (1)
A look at Logrhythm Network Analyzer (Free) (1)
Password security for memSQL (Docker) (1)
Network analysis with Pandas, memSQL and Python - is it BigData or just fast? (1)
Netflow data analysis with SiLK and Pandas (1)
OpenSource Netflow collection with SiLK, FlowBat - and how to perform data analysis (3)
Analyse EventLog, Syslog and Suricata's eve.json with Sumo Logic (1)
Automate Incident Response with Carbon Black / Bit9 API (1)