Categories
Tags
2fa aboutme Access-Control access-control Active Directory active directory active-directory Active-Directory Active-Response active-response ad-blocking administration admission-control adr Advanced-Logging advanced-threats Agent-Deployment Agent-Management ai AI ai-cybersecurity ai-detection ai-powered-scoring AI-Security ai-threat-detection ai-threat-hunting alert-consolidation Alert-Enrichment alert-fatigue alerting Alerts Alpine-Linux amd-sev amtd analysis Analytics analytics Android anomaly-detection ansible Apache api API api-design api-gateway api-management api-security apparmor AppArmor apple applescript application-security applications APS apt-detection arch-linux architecture architecture-patterns argocd arm-trustzone Artificial-Intelligence assemblyscript Async attack-detection attack-patterns Attack-Prevention attestation Audit-Logging Auditd authentication Authentication authentication-security authorization auto-reboot automated-monitoring automated-response automation Automation autoscaling AWS aws AWS-Bedrock aya Aya Azure azure backend background-services backstage backup bare-metal baseline-analysis baselining bash bcc behavioral-analysis behavioral-analytics benchmarking Best Practices best-practices Best-Practices BestPractices Big-Data bind-mounts blockchain Blogging blue-green blue-team Blue-Team bluechi bochs bpftrace broadcom browser Brute-Force brute-force build build-configuration busybox BYOD byzantine c calico canary Career cdc centos certificate-authority certificates Chainsaw Change-Management chartmuseum Chatbot ChatGPT check_wmi_plus choreography ci-cd CI-CD CICD cicd cilium circuit-breaker CIS cis cis-benchmark cka Claude-Haiku cleanup cli-tools cloud cloud-native Cloud-Native cloud-providers cloud-security Cloud-Security cloudflare cloudflared CloudNative cluster cluster-deployment cluster-health cluster-management cluster-setup cmd CMMC cni code management Command-Module communication communication-patterns compensation compliance Compliance compliance-automation compliance-reporting compression confidential-computing configmaps configuration configuration-management consensus consul container Container Orchestration Container-Architecture container-management container-monitoring container-orchestration container-runtime Container-Security container-security containerization Containerization containers Containers contract-testing controller controller-manager coredns coreos correlation correlation-rules cpp CPU-Monitoring cqrs crd cri-o cronjob cronjobs cross-cloud Cross-Cluster-Search Cross-Platform Crypto-Mining cryptography csharp custom linux custom-decoders Custom-Rules customization Customization cyber-threats cybersec Cybersecurity cybersecurity daemonsets dashboard dashboards Data-Analysis data-architecture data-breach data-consistency data-fetcher Data-Filtering data-governance Data-Lake data-management data-masking data-migration data-normalization data-pipeline data-pipelines data-prepper data-processing Data-Protection Data-Residency database dba debian Decoders decoders defense defensive-security Demo dep deployment Deployment design-patterns desktop-development detection detection-accuracy Detection-Engineering developer-portal developer-portals development Device-Monitoring devops DevOps DevSecOps devtools devtron DFIR diagrams Digital-Forensics digital-payments digital-transformation disaster-recovery discovery Disk-Monitoring disk-provisioning Distributed-Security distributed-security distributed-systems distributed-transactions distro distrobox dkim dmarc dnf dns docker Docker documentation DoD domain-administration Domain-Controller domain-driven-design dx-operational-observability e-payment eBPF ebpf ECS edge-computing edge-devices edge-security EDR edr elastic-alternative Elastic-Stack elasticsearch Elasticsearch elgato email Email Email-Automation embedded linux embedded-systems encryption Endpoint-Monitoring Endpoint-Protection endpoint-security Endpoint-Security enterprise Enterprise Enterprise Security Enterprise-Architecture enterprise-architecture enterprise-clustering enterprise-governance enterprise-security Enterprise-Security environment-variables envoy EPS etcd ETW eureka Event-Channel event-correlation event-driven event-driven-architecture Event-Logs event-monitoring Event-Monitoring event-sourcing event-streaming Event-Tracing EVTX-Analysis Example exploit-prevention exploitation falco Fargate fault-tolerance feature-flags federation fedora fedora-coreos ffmpeg file-integrity File-Integrity-Monitoring file-integrity-monitoring filebeat FIM financial-security fintech fips fips-203 firewall Firewall Firewall-Monitoring fluentbit Fluentd flux forensics Forensics ftp FTP gainsaheb GCP gcp gcs git github GitHub-Actions gitlab GitOps gitops go golang google-authenticator google-cloud governance GPO gpt grafana graphical interface group-policy grpc gui guide Hadoop hardening hardware hardware-acceleration hardware-security hashicorp HDFS health-probes helm helm-charts High-Availability high-availability hirte Historical-Analysis history homebrew homelab hpa hsm https hybrid-cloud Hydra hypothesis-driven IaC icinga ide identity management identity-governance identity-management IDS ignition IIS incident-response Incident-Response index index-management indexer industrial-iot industrial-security Infopercept infrastructure Infrastructure Infrastructure-as-Code infrastructure-as-code Infrastructure-Monitoring ingress insider-threats installation instrumentation integration Integration integration-testing intel-sgx internet interoperability intrusion-detection intrusion-prevention inventory Invinsense IOCs IOKit iot IPS isa istio IT-security iterators jasmin java javascript jest Journald jsonpath jwt JWT k8s kafka kannel kaslr keepalive Kerberos kernel Kernel kernel-security key-management keycloak Kibana KIND kms kprobe kpti kubeadm kubectl kubernetes Kubernetes kubernetes-security kustomize kyber labels lattice-cryptography launchd LDAP legacy-systems libvirt lightweight distro linkding linkerd linux Linux linux development linux from scratch linux kernel linux kernel compilation linux system linux-kernel Linux-Kernel Linux-Security linux-security liveness lkl Llama3 llm LLM load-testing log Log-Analysis log-analysis Log-Collection log-ingestion log-management Log-Management log-parsing Log-Processing LogcatUDP logging logs Logstash Logwatch lsm LSM lunarvim MAC machine-learning Machine-Learning macos macOS Maintenance Malware malware-analysis Malware-Detection malware-detection malware-protection management manifest maps markdown Markdown master-keys mdm MDM Memory-Monitoring memory-safety mermaid message-queue messaging metrics metrics-server MFA mfa micro-segmentation micromdm microservices Microservices microsoft-copilot microwindows migration MikroTik minimalistic os minio MISP mitigation mitre-attack ml-integration ml-kem mlops mobile-device-management Mobile-Security monitoring Monitoring morphisec MSI MSSP mtls multi-cloud Multi-Cloud Multi-Cluster multi-cluster Multi-Service Multi-Site multi-tenancy multi-tenant multipass musl nagios Namespaces nano-x nats neovim netdata netflix Network network-access network-correlation Network-Monitoring Network-Scanning network-security Network-Security networking Networking neural-networks neuvector nfs nginx nist-standards Nmap node-affinity node-exporter Node.js nodejs noisy-neighbors notifications Notifications NTLM oauth2 OAuth2 object-storage objective-c observability oci-runtime OCSF offensive-security oidc Ollama open source open-xdr opensearch OpenSearch openssh openssl OpenSSL opentelemetry openvpn operating system operating-systems operators optimization Optimization oracle oracle23c orchestration Orchestration organizational-charts OSSEC ot-ics owasp OXDR package-management packaging packet-capture packet-processing pact partitioning patterns pbft PCI-DSS PDF-Reports penetration-testing performance Performance performance-benchmarking performance-optimization persistentvolumeclaims persistentvolumes php pihole pixie pkcs11 PKI pki Platform Development Platform Engineering platform-engineering plugin plugins pmp PnP pod-security podman pods Policy-Monitoring polyglot-persistence post-quantum-cryptography Postfix postgresql powershell PowerShell priority-management Privileged-Access process-exporter Process-Monitoring Process-Supervision processor production Production production-deployment Production-Setup productivity programming prometheus protocols proxy Pulumi python qemu quadlet quadlets quality-assurance quantum-computing quantum-resistance quantum-resistant Query-Language quic rabbitmq raft ransomware ransomware-defense rbac RBAC rdp react readiness real-time Real-time real-time-analytics red-team reference Regex regulatory-compliance Remote-Commands Remote-Logging ReplicaSet repository management resilience resilience4j resource-management Resource-Monitoring rest-api restore risc-v risk-based-alerting risk-management rocky-linux rolling-updates Rootcheck rootkit rootless rootless-containers Router rpm-ostree rsyslog rule-engine Rules rules runtime-protection Runtime-Security runtime-security Rust rust s6-overlay safari safety-critical saga-pattern sandboxed-execution sandboxing scalability Scalability sched_ext scheduler scheduling scim Screen-Sharing scripting sdlc search search-engine seccomp secrets secrets-management secure-boot secure-coding secure-element secure-enclaves security Security Security Platform Security-Analysis security-analytics Security-Analytics Security-Architecture security-architecture Security-Auditing Security-Automation security-automation security-commands security-data-lake Security-Framework Security-Hardening Security-Management security-monitoring Security-Monitoring security-operations Security-Operations Security-Orchestration security-orchestration security-platform security-runtimes security-systems security-testing security-tools security-trends selinux seo server-setup service mesh service-accounts service-discovery service-mesh Services sharing shell shell-configuration shell-scripting shellcode Shuffle siem SIEM sigstore SilkETW single-node sinkhole site-speed slsa smack smallstep smpp sms sms-gateway smtp SMTP snapshot snort SOAR soar SOC soc software development software-attestations software-testing spf spiffe spire squarespace sre ssh SSH SSH-security ssl SSL/TLS starship statistical-analysis stepca storage storageclass streaming supply-chain-security suricata swift Swift sysadmin Syslog syslog sysmon Sysmon system services system-administration System-Administration System-APIs System-Audit system-calls system-design system-extension System-Health system-maintenance system-programming System-Security systemd systems-programming tag1 tag2 taints tcp Tenzir terminal terminal-services Terraform terraform testcontainers testing tetragon threading threat-detection Threat-Detection threat-hunting Threat-Hunting Threat-Intelligence threat-landscape threat-modeling threat-prevention threat-remediation threshold-cryptography tinyemu tls TLS toast-notifications token-flow Tokio tolerations tomcat tools tpm tracee tracing troubleshooting trusted-execution trusted-execution-environments trusted-publishing tunnel tunneling turing tutorial ubuntu Ubuntu udev udp ui ULS Unified-Logging uninstallation unisolation unix utilities upgrade uprobes usb-control USB-Monitoring use-cases user accounts user-experience User-Mode user-monitoring user-session utm-stack vault vendor-lock-in version control version-control Version-Control Video violation-detection virtualization VirusTotal visualization Visualization vmware volumes vpn vsftp vulnerabilities vulnerability vulnerability-analysis Vulnerability-Assessment vulnerability-detection Vulnerability-Management wasi wasm wazuh Wazuh Web Development web-development web-filtering web-infrastructure web-performance webassembly websockets white-labeling windows Windows windows admin center Windows Server 2019 Windows Services windows updates windows-10-iot windows-api Windows-Firewall Windows-Forensics windows-monitoring windows-security Windows-Security winexe winrt wmi worker-nodes Workflow-Automation workflow-automation workload-identity WQL xdp XDP XDR xdr xdr-platform xdr-testing xpc xprotect yaml YARA zero-copy zero-day zero-trust Zero-Trust zsh ztna
Windows Server 2019 - Active Directory Installation
Step-by-step guide for installing Active Directory on Windows Server 2019.
308 words
|
2 minutes
Expressive Code Example
How code blocks look in Markdown using Expressive Code.
737 words
|
4 minutes
This is a simple, lightweight GUI-based Linux distribution designed to run on QEMU. 2024-04-08
/
linux /
linux kernel /
operating system /
distro /
lightweight distro /
busybox /
nano-x /
microwindows /
qemu /
gui /
graphical interface /
custom linux /
embedded linux /
open source /
unix utilities /
minimalistic os /
linux from scratch /
linux development /
linux kernel compilation /
linux system This is a simple, lightweight GUI-based Linux distribution designed to run on QEMU.
430 words
|
2 minutes

Enhancing Data Security with the Wazuh Open Source FIM 2024-01-30
/
Wazuh /
FIM /
File-Integrity-Monitoring /
Security /
Compliance /
Threat-Detection /
Data-Protection /
Change-Management /
Windows /
Linux Learn how to implement Wazuh's open source File Integrity Monitoring (FIM) module to detect unauthorized file changes, track system modifications, and protect against malware intrusions on Windows and Linux endpoints.
1571 words
|
8 minutes
Monitoring Network Devices with Wazuh 2024-01-19
/
Wazuh /
Network-Monitoring /
Syslog /
MikroTik /
Router /
Firewall /
Network-Security /
SIEM /
Infrastructure /
Log-Analysis Learn how to monitor network devices like routers, switches, and firewalls using Wazuh. This guide demonstrates MikroTik router integration with custom decoders and rules for comprehensive network security monitoring.
2083 words
|
10 minutes
Theseus OS
Theseus is a new OS written from scratch in Rust to experiment with novel OS structure, better state management, and how to leverage intralingual design principles to shift OS responsibilities like resource management into the compiler.
437 words
|
2 minutes
Active Directory Setup on Windows Server 2019
Guide to setting up Active Directory on Windows Server 2019, including PowerShell commands for OU management.
177 words
|
1 minute