The Cranefly hacking group, aka UNC3524, uses a previously unseen technique of controlling malware on infected devices via Microsoft Internet Information Services (IIS) web server logs. Microsoft ...
Some data sources present unique logging challenges, leaving organizations vulnerable to attack. Here’s how to navigate each one to reduce risk and increase visibility. All logs are not created equal.
Web robots are software programs which automatically traverse through hyperlink structure of Web to retrieve Web resources. Robots can be used for variety of tasks such as crawling and indexing ...
Summary 2.3, a new version of the Web server log analyzer from Summary.Net is now available and compatible with the classic Mac operating system and Mac OS X. <?php ...
The Webalizer is an open-source external log file-analysis product that is available for Linux and Windows platforms. It is capable of reading a standard Web-server log file, such as those generated ...
Summary.Net has released Summary 2.6, an update to its advanced Web server log analysis tool. This release features 23 new reports and many new columns in existing reports, a new Mac OS X-native ...
This technical SEO tutorial takes a step-by-step approach to create your free server logs dashboard using Elasticsearch. This approach harnesses the power of Elasticsearch to help create powerful ...
I have a few Apache webservers, and was wondering what products other people use to crunch the logs into nice, graphical charts that tell everyone at a glance, who came to our site, how many came, how ...
If you operate Internet-connected servers, chances are you eventually will have to deal with a successful attack. Last year, I discovered that despite the multilayered defenses in place on a test Web ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results