The most recent content from our members.
What’s in a log file? The very purpose of IT security is to be proactive make it difficult for someone who attempts to compromise your network. You also need to be able to detect the actual breaches as they are being attempted. This is where log data really helps. Collecting and analyzing logs, help you can understand what…
The largest population of the world, China, woke up last Sunday (25th August, 2013) to the most colossal distributed denial of service (DDoS) attacks to have rattled the Chinese digital age. With over 8 million websites affected[1] on .cn domains, the government has condemned this incident and dubbed it the biggest ever…
You Can Be a Victim of Social Engineering Social engineering is a human hacking tactic, as opposed to brute-force attacks, that involves unsuspected social engineers who take advantage of the gullible nature of the victim (You!) and extract information such as credentials, access codes, financial and trade secrets, and any…
I'm trying to differentiate between a few different Log entries, which all have the same Event ID number. I'm setting up a component monitor that has INCLUDE EVENTS WITH KEYWORDS. Is it possible to configure it to ensure all keywords are found within the Event ID that shows up in the log? This is what happens, for example,…
It looks like you're new here. Sign in or register to get started.