-
Goal: Allow deployment for an intrusion detection and/or prevention system into a Calico cluster.
This is actually 2 goals:
- Intrusion detection system (IDS): passively watches packets, and ale…
-
I'm trying to explore your works, but I can't figured how can snort started with different mode rather than just sending the alert (ex. IDS mode with full payload output, or packet logger mode, etc)
-
**What would you like to be added**:
I would like to log all denied packets via nflog with a configurable log target instead of logging to the kernel log, or configuring rich nflog rules on a chain…
-
**Description**
A docker swarm have services with containers from a private registry.
The registry is saved with basic auth.
The credentials are saved local after the docker login command.
…
-
Hello,
I have talked with Borislav, he told me that you are looking for more secuity on the webserver.
In my past positions I have worked for a short time with the following tools that I would short …
-
This bug was originally filed in Launchpad as [LP: #1658734](https://bugs.launchpad.net/cloud-init/+bug/1658734)
Launchpad details
affected_projects = ['cloud-init (CentOS)']
assignee = None
assigne…
-
Hi,
When using JSMA method, I found that **the implementation of adversarial saliency map of this toolbox is slightly different from the original paper:**
**In this toolbox,** corresponding imp…
-
-
A security vulnerability in a system refers to a weakness or flaw that can be exploited by attackers to gain unauthorized access, manipulate data, or disrupt the normal functioning of the system. Here…
-
In order to improve security, we want to monitor the state of our servers. This includes adding a tripwire system that keeps monitoring certain files to see if they get modified. A possible system for…