
Download FileHACKING_DATA_Hakin9_11_20111.pdf Please login or Register to access downloadables Download Latest News From IT Security World By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Secure Log Server With Rsyslog By Leonardo Neves Bernardo This article will discuss how to create a secure syslog server using rsyslog. It is covered how to protect syslog messages with Transport Layer Switching (TLS). Some advanced rsyslog configurations will be covered. Logs are one of the most important security assets inside IT environments. Without logs it’s almost impossible to follow audit trails. There are a lot of types of logs and some types are very different from others. Sometimes the sources of logs are different, for example from a Unix system, windows system or network appliance. Sometimes logs are....
Author

Latest Articles
Issues2022.07.04Best Hacking Tutorials in 2022
free2022.07.04Best Hacking Tutorials in 2022 Preview
2021.09.15Archives 2013 - 2016 Copy
Archives2021.09.15Archives 2017 - 2020