A summary of Linux profiling/monitoring tools
graphite-metrics - metric collectors for various stuff not (or poorly) handled by other monitoring daemons
Once a MySQL database server has been compromised at root level, it's often possible to escalate this access to full system level access using User Defined
sqlmap - Automatic SQL injection and database takeover tool
Perverting Embedded Devices - ZKSoftware Fingerprint Reader (Part I) - Infobyte Security Research Labs
Lets test some password breaking tools. Password's are often the weakest link in any system. Testing for weak passwords is an important part of security as
L'Agence Nationale de Sécurité des Systèmes d'Information (ANSSI) a publié jeudi des recommandations destinées principalement aux entreprises, concernant les
One of the challenges of centralized logging is that log formats blossom like
umbrellas in cheap cocktails. One of the few apparent exceptions to this is Syslog. I mean it is governed by an
RFC right? It’s a standard in logging right? At this point some of you in the know are sniggering: “Syslog has an RFC… Syslog standards… hahahahaha…”
I’ve done a lot of tweeting about systemd lately. My internal conscience constantly reminds me of John Allspaw saying that twitter is just pr...