Sharing our logging knowledge. A place we log our insights, experiences, and findings as it pertains to the world of logs.
Learn how to proactively identify cybersecurity threats through log analysis. This guide covers essential threat-hunting techniques, from detecting suspicious logins to flagging anomalies, ensuring your organization's defenses stay ahead of attackers.
Learn how to proactively identify cybersecurity threats through log analysis. This guide covers essential threat-hunting techniques, from detecting suspicious logins to flagging anomalies, ensuring your organization's defenses stay ahead of attackers.
Learn the top 5 reasons why monitoring web server logs is crucial for your website. Boost security, optimize performance, ensure compliance, and gain insights to enhance user experience. Don't miss these essential benefits!
Looking at our web logs when the site is under a DDoS / HTTP flood attack. How it looks like.
Web Attack Analysis - Malicious IP 50.16.95.X. Breakdown of the malicious activity from IP 50.16.95.X, Covering 50 different attack types, user-agent spoofing, and vulnerabilities across multiple platforms.
An explanation of NetFlow, including how it works, the data it collects, storage considerations, and how to analyze NetFlow records.
Learn how to enable, read, and analyze MySQL logs to monitor and troubleshoot your MySQL database effectively.
An in-depth look at the types of Linux audit logs in /var/log/audit/audit.log, Enabled by default on Red Hat and Suse Linux, they can provide a lot of information about what is happening on your system.
Grep Performance - Grep is the goto command to search for content on Linux and Unix systems. How fast can it go? And at what point you need a a different way to look for logs.
Logging basics. An explanation of how the Syslog network protocol works, including message transmission, ports, and analysis with tcpdump.
Compressing SQLite databases with the ZFS file system on Linux. Testing the storage gain and the performance difference.
Explore the differences between SIM (Security Information Management), SIEM (Security Information and Event Management), log management, and log analysis.
14 days free trial. No credit card required.