Technical Information Security Content & Discussion

10 readers
1 users here now

/r/netsec is a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to...

founded 2 years ago
MODERATORS
26
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/ilay789 on 2024-01-18 13:49:44+00:00.

27
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/dx7r__ on 2024-01-18 09:10:48+00:00.

28
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/guedou on 2024-01-16 16:35:13+00:00.

29
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/albinowax on 2024-01-16 15:36:27+00:00.

30
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/ZephrX112 on 2024-01-16 13:03:25+00:00.

31
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/EatonZ on 2024-01-17 16:58:26+00:00.

32
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/netbiosX on 2024-01-15 11:31:25+00:00.

33
 
 
The original post: /r/datahoarder by /u/InternalOcelot2855 on 2025-02-10 04:19:23.

I have some drives in the mail coming to me. It could be 2–3 weeks from now.

I also have some 6tb drives I can use to store some data till these drives come in. They are Western Digital SMR drives. What testing method can I do to ensure that the drives will not fail till the new ones come?

I understand it's a risk, hopefully nothing happens.

34
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/OSTEsayed on 2024-01-14 18:00:29+00:00.


Automate the process of analyzing web server logs with the Python Web Log Analyzer. This powerful tool is designed to enhance security by identifying and detecting various types of cyber attacks within your server logs. Stay ahead of potential threats with features that include: Attack Detection: Identify and flag potential Cross-Site Scripting (XSS), Local File Inclusion (LFI), Remote File Inclusion (RFI), and other common web application attacks.

Rate Limit Monitoring: Detect suspicious patterns in multiple requests made in a short time frame, helping to identify brute-force attacks or automated scanning tools.

Automated Scanner Detection: Keep your web applications secure by identifying requests associated with known automated scanning tools or vulnerability scanners.

User-Agent Analysis: Analyze and identify potentially malicious User-Agent strings, allowing you to spot unusual or suspicious behavior.

35
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/cyberforce218 on 2024-01-12 16:23:36+00:00.

36
 
 
The original post: /r/aww by /u/ShiningStarssss on 2025-02-08 08:28:34.
37
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/arch_rust on 2024-01-13 22:03:40+00:00.

38
 
 
The original post: /r/aww by /u/Colettechocolate on 2025-02-08 08:21:31.
39
 
 
The original post: /r/aww by /u/starlightrayzo on 2025-02-08 08:19:30.
40
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/dx7r__ on 2024-01-13 12:28:06+00:00.

41
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/gid0rah on 2024-01-13 10:51:22+00:00.

42
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/m417z on 2024-01-13 10:11:40+00:00.

43
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/42-is-the-number on 2024-01-12 15:10:03+00:00.

44
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/scopedsecurity on 2024-01-12 14:37:51+00:00.

45
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/scopedsecurity on 2024-01-12 14:38:28+00:00.

46
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/scopedsecurity on 2024-01-12 14:38:28+00:00.

47
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/scopedsecurity on 2024-01-12 14:37:51+00:00.

48
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/pracsec on 2024-01-12 14:06:17+00:00.


This post covers the use of internal proxy techniques and some employment considerations.

49
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/thinkV on 2024-01-12 11:52:18+00:00.

50
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/g_e_r_h_a_r_d on 2024-01-12 08:05:06+00:00.

view more: ‹ prev next ›