It’s a fact: Pv6 deployments are on the raise. We are close to the end of 2011 and this year was really some kind of a kick-off year to deploy the new protocol or to make live tests. I won’t come back on all the new features implemented in the
Feeding DShield with OSSEC Logs
The primary goal of a log management solution is to receive events from multiple sources, to parse and to make them available for multiple purposes: searching, alerting and reporting. But why not send some interesting events to another log management system or application? Usually, some inputs are added in the
Developers, IPv6 is also a Challenge for You!
I hate situations like the one I faced this afternoon… I’ve a daemon, written in Perl, running on a Linux box for months now. When I say for months, it means: Without restarting the process or the host except regular upgrades. But, for maintenance reasons, I had to reboot the
Abuse Info Gathering Made Easy
If there is a boring task when you are investigating a security incident, it’s the process of gathering all information related to the involved IP addresses: What are the IP addresses used, routing information (AS), geo-localisation and abuse information gathering. Alexandre Dulaunoy wroteÂ a cool piece of Perl code to