blog


Threat Feeds to feed the needs - ThreatPinch and Splunk / Sumo Logic / Web frontends for logging (1)
My top 5 eLearning video courses for Q1 2017 (1)
MSDN - benefits via Visual Studio Pro (1)
Laptop review: a 13" Big Bertha for Big Data - Dell / Alienware 13" R3 OLED (2)
News from the Cloud9 IDE: We Go now (1)
Project Alexandria - next-gen learning through personal searching (1)
Is Glasswire snakeoil? (1)
A look at Logrhythm Network Analyzer (Free) (1)
Password security for memSQL (Docker) (1)
Network analysis with Pandas, memSQL and Python - is it BigData or just fast? (1)
Netflow data analysis with SiLK and Pandas (1)
OpenSource Netflow collection with SiLK, FlowBat - and how to perform data analysis (2)
Analyse EventLog, Syslog and Suricata's eve.json with Sumo Logic (1)
Automate Incident Response with Carbon Black / Bit9 API (1)
How to start Anaconda (Data Science Python toolset) on Arch Linux (1)
Handle Syslog with fluentd - real syslog (1)
Hackrf and VMware? USB 3? How fast? (1)
Pipe Suricata eve.json to Elasticsearch with fluentd (1)
Integrate Suricata with IBM QRadar 7 (1)
Vagrant SSH on Windows (1)
Indicators of failure for information security projects (1)
Bro - do you even SIEM? (1)
A transparent jump host setup for RDP / SSH on Linux and Windows - admin hacks (1)
Development environment for BinNavi - with a package manager (Windows) (1)
Beats - ELK inputs simplified - for IT wide log management (1)
Letsencrypt with strong SSL and Lighttpd (1)
Fix PaX flags and grub2 (1)
Cloud9 WebIDE - self-hosted in 2 easy steps (1)
Public Relations actors for public surveillance are bad advocates (1)
Using Intelligence based models for neutral analysis (1)