Installing an Intrusion Detection System (IDS) and Reporting Interface
An intrusion detection system (IDS) can perform log analysis, check file integrity, monitor policy changes, and keep an eye out…
Because everyone is entitled to my opinion
Programming
An intrusion detection system (IDS) can perform log analysis, check file integrity, monitor policy changes, and keep an eye out…
Iftt.com. It stands for (if this then that). It’s basically a “triggerâ€system that ties into tons of services including RSS,…
Making the equivalent of mistakenly hitting the reply all button, Google Engineer Steve Yegge posted a very well written rant…
He works on a large scale in public and residential areas and his paintings can be seen all over the…
A Dutch man built this and posted it on tweakers.net (a Dutch website but translates to English pretty good using…
Recently Google hosted a thread on Reddit where they answered questions from the general public. The question of Internet connection…
Silicon wafers used in computer chipsets (processors) have typically been two dimensional. On May 4, 2011, Intel announced a 3-D…
The following are notes on SharePoint inter-process communications, network communication protocols, ports that SharePoint Server uses during its operation, etc.
The ASP.Net ListView control is a godsend for developers. Drop the control on the form, hook in a datasource, and…
My firewall caught some odd injection attempts which lead to research on the intent of the hackers. Turns out it…