Securing Your Network Equipment - simple steps Tuesday, January 31, 2006

A few simple yet apparently often overlooked security measures for equipment that lives on an untrusted network.

Log Analysis, why not grep? Saturday, January 14, 2006

Grep, sort, uniq, awk, sed are all worthy tools, but part of the job is deciding when one tool, or tool-set is no longer enough to accomplish your mission. When should you turn over the job to a true sorting engine, a relational database?

So you say you dislike gallery yappa gallery-program-13? Tuesday, January 03, 2006

I dislike gallery programs as well, why I have no idea. I think I wanted to write my own sometime in the past. I may still do that in the future… something with a nice web-form to upload images, user privileges and comment capability… sometime, when I have time and don’t have other obligations.

Quick Log Parsing router access-list logs Monday, January 02, 2006

A few quick ways to use normal unix command-line tools to parse logs for classification of problems or identification of activity. The aim of this would be to help folks find out what is causing a problem on a particular interface, not long term analysis which should be covered somewhere else. Part of it is covered in this package available on SourceForge.Net.