Article: Using Linux grep and Windows findstr to Manipulate Files, (Fri, Mar 31st) - published over 1 year ago. Content: Over the years I have found grep to be very versatile. The most common use of grep is to find if the logs have a string that match an IP address, a domain, a service or protocol, some application was logged, etc. https://isc.sans.edu/diary/rss/29696 Published: 2023 04 01 14:24:24 Received: 2023 04 01 14:54:39 Feed: SANS Internet Storm Center, InfoCON: green Source: SANS Internet Storm Center, InfoCON: green Category: Alerts Topic: Vulnerabilities |
Article: Russian Cyberwarfare Documents Leaked - published over 1 year ago. Content: Now this is interesting: Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet. The company’s work is linked to the federal security ser... https://www.schneier.com/blog/archives/2023/03/russian-cyberwarfare-documents-leaked.html Published: 2023 03 30 22:00:03 Received: 2023 04 01 14:23:14 Feed: Schneier on Security Source: Schneier on Security Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor