This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| index=_internal sourcetype=scheduler search_type="scheduled" scheduled_time=* savedsearch_name=*rule scheduler rule earliest=-24h@h latest=@h | |
| | eventstats count by savedsearch_name | |
| | where count>=23 | |
| | eval H=strftime(scheduled_time, "%-H") | |
| | eval M=strftime(scheduled_time, "%-M") | |
| | chart limit=24 count over M by H | |
| | table M 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 |
| π‘ - Awful | π - Bad | π - Fine | π - Good | π - Exceptional |
---------------------------------------------------------------------------------------------------------------
books listed in chronological order from last read to first read
- π - Surveillance Valley - Yasha Levine
- π - The Ransomware Hunting Team - Renee Dudley and Daniel Golden
- π - CRACK99 - David Locke Hall
- π - The Spy Who Couldn't Spell - Yudhijit Bhattacharjee
- π - The Fifth Domain - Richard A. Clarke, Robert K. Knake
- π - Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks - Scott J. Shapiro
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
| # PS : ChatGPT makes mistakes, consider "trust but verify" principle | |
| ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
| #Events to Monitor | |
| https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/appendix-l--events-to-monitor | |
| ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
| #run | |
| eventvwr.msc Event viewer | |
| ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
| Event Viewer(Local)-Windows Logs (shutdown / restart ) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| using System; | |
| using System.Collections.Generic; | |
| using System.Diagnostics.Eventing.Reader; | |
| using System.Text.RegularExpressions; | |
| using System.Threading; | |
| namespace EventLogSearcher | |
| { | |
| class Program | |
| { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ############################################################################### | |
| # The MIT License | |
| # | |
| # Copyright 2012-2014 Jakub Jirutka <jakub@jirutka.cz>. | |
| # | |
| # Permission is hereby granted, free of charge, to any person obtaining a copy | |
| # of this software and associated documentation files (the "Software"), to deal | |
| # in the Software without restriction, including without limitation the rights | |
| # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
| # copies of the Software, and to permit persons to whom the Software is |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Security Onion | |
| Aug 2014: | |
| ... my purpose for installing this was to: | |
| - learn more about security stuff | |
| - steal the packet captures (pcap) provided so I can replay them using tcpreplay for snort testing, | |
| as it's not so sexy to just test using ICMP ping data or local rules that match anything | |
| see: | |
| http://blog.securityonion.net/ |
The Recommended Reading List is a valuable resource for technical professionals who want to thoroughly explore topics such as multi-core programming, embedded, security, and more. Dozens of industry technologists, corporate fellows, and engineers have helped by suggesting books and reviewing the list.
- Power Management in Mobile Devices - Findlay Shearer - Newnes - 9780750679589
- Thermal and Power Management of Integrated Circuits - Arman Vassighi, Manoj Sachdev - Springer - 9781441938329