|
NXLog TEHTRI-Security Partnership |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Présentation : Our consultants at TEHTRI-Security recommend using NXLog Community Edition NXLog CE , or NXLog Enterprise Edition NXLog EE , as the preferred log collector to interact with our product called eGambit. We've been using NXLog CE EE for a long a time, with tremendous technical results. Before mid-2014, NXLog was already integrated in eGambit. Now in 2015, NXLog and TEHTRI-Security will be partners around these security concepts. For all TEHTRI-Security partners and customers, this implies that a move to NXLog technologies is highly suggested. Direct help or support can be organized with NXLog or with TEHTRIS over eGambit. Beyond the fact that NXLog is an awesome multiplatform log collector, there are many reasons why this is the preferred solution to interact with eGambit. We have access to the source code, meaning that we can read and analyze or work easily around it. The quality of the code is excellent, as you can check by yourself at least with the opensource NXLog Community Edition. On top of this, NXLog have many strengths like high-performance i o, support of secure protocols, internationalization, real-time event classification, MS Windows family supported, etc. So now, join us, and let's hunt evil attackers through your logs and beyond, by combining the powers of NXLog and eGambit.
Les derniers articles du site "TEHTRI Security RSS" :
- TEHTRIS obtient le label France Cybersecurity pour son produit eGambit - Label UBfriendly obtenu avec l'Université de Bordeaux - FR 1 Million de binaires Windows pour eGambit cette semaine - eGambit version 3.0 - NXLog TEHTRI-Security Partnership - Security Advisory - Vulnerability on Twitter spoof tweets on any account - New trends with SSH attacks found by eGambit - Security Advisory - 0day in Rockwell Automation - Security Advisory - 0day in ThreatStream MHN - Opensource Honeypots are insecure
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|