
securitynik.blogspot.com
Learning by practicingLearning is an ongoing activity ... practicing makes it fun
http://securitynik.blogspot.com/
Learning is an ongoing activity ... practicing makes it fun
http://securitynik.blogspot.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Saturday
LOAD TIME
2.2 seconds
16x16
32x32
64x64
128x128
PAGES IN
THIS WEBSITE
18
SSL
EXTERNAL LINKS
1
SITE IP
172.217.0.161
LOAD TIME
2.156 sec
SCORE
6.2
Learning by practicing | securitynik.blogspot.com Reviews
https://securitynik.blogspot.com
Learning is an ongoing activity ... practicing makes it fun
Learning by practicing: April 2016
http://securitynik.blogspot.com/2016_04_01_archive.html
Learning is an ongoing activity . practicing makes it fun. Saturday, April 2, 2016. QRadar - Building your first Universal DSM (UDSM). So why would you want to build your own DSM? I'm glad you asked! Have you ever had a log source you would like QRadar to parse but IBM does not support it at this time? Then you need to know how to build your own. So I put together what I assume is a unique log pattern as shown below. Start of sample logs - - - - - -. End of sample logs - - - - - -. The above matches quit...
Learning by practicing: Format String Vulnerability – Information Leakage
http://securitynik.blogspot.com/2017/01/format-string-vulnerability-information.html
Learning is an ongoing activity . practicing makes it fun. Sunday, January 1, 2017. Format String Vulnerability – Information Leakage. While this post focuses on information leakage as a result of format string vulnerability and the other on overwriting memory. There are more that could be done to a program such as crashing a program. Let’s start off with the code. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23. Fmtstr info leak.c. Sample code demonstrating Format String information leakage.
Learning by practicing: September 2016
http://securitynik.blogspot.com/2016_09_01_archive.html
Learning is an ongoing activity . practicing makes it fun. Sunday, September 25, 2016. IBM Qradar: How to import logs from an Amazon S3 compatible log source. Many vendors nowadays are using the Amazon S3 API as a method to access and download their logs. Cisco is an example of this, and they host their Cloud Web Security (CWS) product logs at vault.scansafe.com and use the Amazon S3 API to make the logs accessible to their users (Other vendors include Hitachi, EMC Vcloud, and many more). Create a new lo...
Learning by practicing: December 2016
http://securitynik.blogspot.com/2016_12_01_archive.html
Learning is an ongoing activity . practicing makes it fun. Friday, December 16, 2016. Docker Networking Internals: How Docker uses Linux iptables and interfaces. I started playing with docker a while ago, and like most people I was instantly impressed with its power and ease of use. Simplicity is one of docker’s core tenants, and much of docker’s power is. Locate a container’s veth interface. Part II: Container Connectivity in Docker Swarm and Overlay Networks. Docker’s networking is built on top o...
Learning by practicing: June 2016
http://securitynik.blogspot.com/2016_06_01_archive.html
Learning is an ongoing activity . practicing makes it fun. Friday, June 10, 2016. Building a Forensically capable network infrastructure. Recently I was invited by the Ottawa Chapter of the High Technology Crimes Investigation Association (HCIA). To do a presentation as I was in Ottawa, Ontario teaching the SANS 503 - Intrusion Detection in Depth. Class The topic I choose to speak on was "Building a Forensically capable network infrastructure". What do I mean by forensically capable network? Building a F...
TOTAL PAGES IN THIS WEBSITE
18
JAGDEO CLEARED FOR THIRD TERM | Conversation Tree
http://conversationtree.gy/jagdeo-cleared-for-third-term
JAGDEO CLEARED FOR THIRD TERM. July 11, 2015. The Constitution Reform Commission was established in 1999 pursuant to the Herdmanston Accord. This was signed by the main political parties in an effort to restore calm after continuing disturbances following the 1997 general elections. All parties and interests represented on the Constitution Reform Commission supported the limitation on presidential terms and it was a major constitutional innovation for Guyana. The inadequate synopsis of Chief Justice Chan...
TOTAL LINKS TO THIS WEBSITE
1
SecurityNexus: Where Security Data Comes Together
Subscribe to our Free Newsletter. Signature Mapping Technology to. I have no cohesive security reporting that covers all of my security products. (more). I get multiple events from my security products, but I can't tell if they are from the same attack or different attacks. (more). When an attack is detected I'm not sure if it is against a known vulnerability in my systems, and I don't know what I should do about it. (more).
SecurityNexus: Where Security Data Comes Together
Subscribe to our Free Newsletter. Signature Mapping Technology to. I have no cohesive security reporting that covers all of my security products. (more). I get multiple events from my security products, but I can't tell if they are from the same attack or different attacks. (more). When an attack is detected I'm not sure if it is against a known vulnerability in my systems, and I don't know what I should do about it. (more).
securitynieuwegein.com
Welcome to the home of securitynieuwegein.com. This domain is registered for a customer of. Date Created: Fri May 23 22:27:07 2014.
Main
SN Security Nieuwegein Group. SN Security Nieuwegein B.V. SN Events and Security B.V. SN Service and Camera Group B.V. SN Security Nieuwegein B.V. T: 31 (0) 30 68 65 720. F: 31 (0) 30 68 76 693. Welkom bij SN Security Nieuwegein Group. Beveiligingsbedrijf SN Security Nieuwegein B.V. is zeer divers inzetbaar. Ons uitgangspunt is klanttevredenheid. Maatwerk is altijd mogelijk. Nominaties SSA Awards 2015 bekend. Auto’s te hacken door gebrekkige beveiliging autosleutel. Veel minder koperdiefstal op het spoor.
Learning by practicing
Learning is an ongoing activity . practicing makes it fun. Monday, January 2, 2017. Like what you see. Come hangout with me at one of my upcoming SANS classes to learn more. SEC503: Intrusion Detection In-Depth. Community SANS Chicago SEC503 Chicago, IL. Feb 20, 2017 -. Feb 25, 2017. SEC503: Intrusion Detection In-Depth. Community SANS Nashville SEC503 Nashville, TN. Mar 20, 2017 -. Mar 25, 2017. SEC503: Intrusion Detection In-Depth. Community SANS New York SEC503 New York, NY. Apr 10, 2017 -. Page=login...
Securitynine
Security ninja
My ramblings about information security. Tuesday, October 7, 2008. The security ninja has left the building. Well as usual things have happened much sooner than I had planned! The new blog and forum went live over the weekend and now the new Security Ninja website is live. I'm happy with the way it looks at the moment and work is ongoing but from today onwards I will not be posting to this blog anymore. The Security Ninja website can be found here. I look forward to seeing everyone on the new site! If an...
Security Ninja | Security research, news and guidance
Security research, news and guidance. SECURITY RESEARCH, NEWS and GUIDANCE. Welcome to the Security Ninja website and blog. We will bring you the latest information and advancements in the area of secure web application development as well as general information security and compliance guidance. Follow us on Twitter and Facebook for the latest updates. July 2, 2014 Written by Security Ninja. Lack of input validation leading to SQL Injection and code fix. Lack of input validation and code fix.
securityninja.com