9%
30.11.2025
; for further details, see my OSSEC article in the ISSA Journal [6].
Download the latest version of OSSEC and execute the following:
tar -zxvf ossec-hids-*.tar.gz
cd ossec-hids-*
sudo ./install.sh
Choose
9%
05.02.2023
to sorted sequence table (SST) files as soon as it reaches a certain size (128MB by default), creating many SST files with all intermediate versions. To limit the amount of data, these files are compressed
9%
25.03.2021
.request.size
Limit the number and size of batches (record-size-max).
Time spent waiting for I/O
Are you really waiting (io-wait-ratio)?
buffer.memory + queued requests
32MB default (roughly
9%
03.09.2013
. In the Manage Devices
section, all Teradici PCoIP devices on the network are detected and listed automatically (Figure 6).
Figure 6: Simple but functional
9%
17.09.2013
with ssh-agent
; the -l
option lists the currently stored keys. With the Windows MobaXterm SSH client, you can easily enable the SSH agent, for example, in the program settings (Figure 6). The PuTTY Suite
9%
21.05.2014
Stack definitely allows users to collect data on VMs and store the data persistently beyond a restart of the virtual machine. This is where Cinder enters the game (Figure 6): Cinder equips virtual machines
9%
26.10.2012
that the frequently forwarded ports belong to services typically used by malware to infect new systems (Figure 6).
Figure 6: Registered attacks on various ports
9%
12.08.2013
.tool
The output is given in JSON format (Figure 5), so piping it to python -m json.tool
makes the output readable (Figure 6).
Figure 5: Performance data queried
9%
03.02.2012
be sure that the evidence is genuine and has not been injected by a malicious third-party? In this context, the term data provenance [6] becomes extremely meaningful: It covers the origins of the piece
9%
16.07.2019
a “wrapper function” for the library in Python (Listing 6).
Listing 6: Wrapper Function
import ctypes
_sum = ctypes.CDLL('libsum.so')
_sum.sum_function