Security Good Practices This page contains a list of URLs that contain good practice guides, audit procedures and technology standards that are freely available.Tags: SecurityGood practices Read more about Security Good Practices
Setting up a centralized log repository How to configure syslog-ng so that logged events are transformed into SQL queries that are then immediately executed in MySQL. Or... How to store syslog messages in a database. Tags: LinuxMonitoring Read more about Setting up a centralized log repository
Using sed Some more advanced examples of how to use the sed command in Linux.Tags: LinuxBashsed Read more about Using sed
POSIX character classes Some of the character classes to use in regular expressions. Tags: LinuxBash Read more about POSIX character classes
Using the WebScarab bean shell to modify requests/responses This article shows how you can use the WebScarab bean shell to modify requests and responses that are transmitted and received by WebScarab. Tags: SecurityWeb application security testingJava Read more about Using the WebScarab bean shell to modify requests/responses