Browsing tag

log

HonSSH – Log all SSH communications between a client and server

HonSSH is a high-interaction Honey Pot solution. HonSSH will sit between an attacker and a honey pot, creating two separate SSH connections between them.  Features Captures all connection attempts to a text file, database or email alerts. When an attacker sends a password guess, HonSSH can automatically replace their attempt with the correct password (spoof_login […]

Security Onion – Network Security Monitoring

Network Security Monitoring (NSM) is, put simply, monitoring your network for security related events. It might be proactive, when used to identify vulnerabilities or expiring SSL certificates, or it might be reactive, such as in incident response and network forensics. Whether you’re tracking an adversary or trying to keep malware at bay, NSM provides context, […]

Find Out If Any One Opens Your Computer Without Your Permission

How to Know Who Logged into your computer and when? In Windows, there is one in-built too will records all events in your computer called “Event Viewer”. This application records all your computer activities from login to log off etc. The Event Viewer can be accessed in all Windows Operating system including Windows XP, Vista, […]