BLOG, BLOGGER,
BLOGST
Top 10 Tips to Secure Your Linux System
Securing a Linux system is crucial for both personal and professional use. Linux is known for its security features, but there are always additional steps you can take to enhance your system's security. Here are the top 10 tips to secure your Linux system, applicable...
Understanding Public Key Infrastructure (PKI): How It Works, Security Flaws, and Remediation
Public Key Infrastructure (PKI) is a crucial component in the digital security landscape. It underpins many of the secure communications and data protection protocols that we rely on daily. In this article, we'll delve into what PKI is, how it works, its security...
Security Updates: Why Keeping Your Software Up to Date Is Crucial?
To answer that question we first need to have a look at the way software is developed and maintained further down the road. After that you will hopefully understand that installing updates is a 'conditio sine qua non' or a must for you to do on any devices you have....
Understanding Scams: How to Recognize and Protect Yourself
In the digital age, scams have become more sophisticated and widespread. Awareness and vigilance are your best defenses. This article will explore common types of scams, how to recognize them, and steps to protect yourself, focusing on IT security and scams. Common...
What is subnetting?
Wow ... this might seem a daunting term for you non network techies out there, but let me explain what subnetting is and you will see that it's not so complicated after all. What is the goal of subnetting? The goal of subnetting is to make efficient use of an IP...
What is a secure password?
There's not a week that goes by without seeing someone posting on social media that his or her account is 'hacked'. In this article we will discuss what you can do to improve all your accounts' security while just making a small sacrifice in usability. First of all,...
Where do my Splunk settings go?
In our previous article about apps, we s either aw that an app is a collection of config files with either general settings of your deployment or data related settings (for example extractions for Palo Alto firewall logs). To understand and to be able troubleshoot...
How does Splunk deploy apps?
In our last article we went over the structure of what in Splunk terms is called an app. I personally think that an configuration bundle would be a better name but he: potato potato 😉 Depending on the circumstances apps are deployed in a certain way. Manual...
What is a Splunk app?
Let me confess something to you all reading this article: Splunk apps and data models (which will cover in a later article) have been two of the most complicated concepts for me to grasp in the Splunk world. Hopefully after I explain it to you, you will understand...
Splunk: the bigger picture
We have been dealing with some parts of the data ingestion in Splunk. Now it's time to put everything we discussed so far into a more helicopter view. Inputs.conf, indexes.conf and outputs.conf There are three files on this diagram we did not speak about yet....