Tag Archives: security

Restricting remote commands over ssh

In this post you will see how to restrict commands executed on a remote server accessed via ssh for a particular user. You can have multiple reasons to do this: you may want some accounts to be able to do … Continue reading

Posted in linux, ssh | Tagged , , | Leave a comment

PyLogsParser: how to write a normalizer

We saw in a previous article how to use the PyLogsParser library in order to analyze connection logs from a SSH server. This was a simple, basic usage of the library. In this article, we will go further and see … Continue reading

Posted in development, log, ssh | Tagged , , , , , | Leave a comment

Pylogsparser : a use case, analysing ssh attacks

In this article we will see how easy it is to use the pylogsparser library through a simple use case. It should help you start working on your own project involving log analysis. Incoming search terms:pylogsparser examplepylogsparser exampleswallix pylogsparser examplespylogsparser … Continue reading

Posted in development, log, ssh | Tagged , , , , , | Leave a comment

2011 Top 25 Most Dangerous Software Errors

The 2011 version of the SANS/MITRE Top 25 Most Dangerous Software Errors is available.

Posted in development | Tagged , | Leave a comment