-
Can you please add a core schema for device so that more details about a source device can be mapped to fields.
Some examples of where device might fit in are: switches, routers, wifi , phone or a…
-
The hell that is due by February 12th.
-
# Everything as Code (XaC)
Everything as Code (XaC) is a software development philosophy that treats infrastructure as code.
- [1. Category](#1-category)
- [1.1. Infrastructure as Code (IaC)]…
-
From slack:
# Types of setups
- active + backup node with tmkms
- 3 sentries setup with tmkms/horcrux
- a mix of validator + 1-3 sentries + horcrux/tmkms
## Best practices
Validator securi…
-
Subscribe to this issue and stay notified about new [daily trending repos in C](https://github.com/trending/c?since=daily)!
-
-
**Describe the bug**
Microsoft Defender ATP is not recognized (although previously fixed under issue #992 and PR #994)
**Version**
- Debian Bullseye
- Lynis version 3.0.8
**Output**
```
2…
-
### Is your feature request related to a problem?
Having an intrusion prevention system would make me feel much confident.
### Describe the solution you'd like
I would love to have the fail2ban Tra…
-
-
* @bushidocodes, Sean McBride, Comprehension: What is the advantage of having a slow progressive attack...
* @bushidocodes, Sean McBride, Comprehension: What is it about the telnet protocol that make…