Cloud, Data Analysis, Cybersecurity

Skip to content
Menu
  • Home
  • Explore
  • Cloud
  • Splunk
  • Consultancy
  • Contact Us

Month: April 2018

IIS Log Analyzer using ELK

by Sumesh MSPosted onApril 29, 2018April 29, 2018

Logstash is a useful tool for processing log files that accept data from multiple sources and different formats. Logstash easly process text-based logs and send…

Read More

CISSP Terms

by Upen PatelPosted onApril 27, 2018April 27, 2018

Abstraction Involves the removal of characteristics from an entity in order to easily represent its essential properties. Acoustic Sensors Device that uses passive listening devices…

Read More

PHP Active Directory Password Reset

by Sumesh MSPosted onApril 26, 2018April 27, 2018

LDAP is the Lightweight Directory Access Protocol, a protocol used to access and manage Directory Servers such as Active directory. The Directory is a special…

Read More

Active Directory Email notification on Locked-out Password Reset Events

by Sumesh MSPosted onApril 25, 2018

Automated email notification for Active Directory User Locked Out and Password Reset events using Powershell. Windows Security Log Event ID 4740  indicates that a user…

Read More

CCSP Terms

by Upen PatelPosted onApril 25, 2018April 26, 2018

All-or-Nothing-Transform with Reed-Solomon (AONT-RS) Integrates the AONT and erasure coding. This method first encrypts and transforms the information and the encryption key into blocks in…

Read More

Elasticsearch Curator

by Sumesh MSPosted onApril 23, 2018April 27, 2018

Elasticsearch Curator helps to curate, or manage, the Elasticsearch indices and snapshots by getting the full list of indices from the Elasticsearch cluster as actionable…

Read More

Configure Splunk Cluster with Commands

by Upen PatelPosted onApril 21, 2018April 27, 2018

BEST PRACTICE Please Plan first based on your requirements and verify your plan. A single cluster or segregated clusters ( by sourcetype, department, or use…

Read More

RSA Decryption using Extended Euclidean Algorithm

by Sumesh MSPosted onApril 17, 2018April 21, 2018

RSA is based on the great difficulty of integer factorization and is the most widely-used public-key cryptosystem used widely in e-commerce systems. Euclid algorithm and…

Read More

Information Security Framework Implementation Benefits

by Sumesh MSPosted onApril 15, 2018April 21, 2018

An Information Security Framework is designed to be flexible enough to be used both by organizations with mature cyber security and risk management programs and…

Read More

Posts navigation

Page 1 Page 2 Page 3 Next Page
  • Contact us
  • Team
  • Privacy Policy

2022 | www.cloudcybersafe.com

Cambium Theme by BestBlogThemes ⋅ Powered by WordPress