This page details the hardening of SSH.
To display available algorithms for a specific SSH client
ssh -Q cipher ssh -Q cipher-auth ssh -Q mac ssh -Q kex ssh -Q key
To audit in a passive manner the SSH servers and clients …
more ...Doing a bit of research with regard to data schema and serializaton, preferably without being JSON_centric.
| Name | Defining Structure/Type | Structure is Extensible | Data Serialization | Data Validation | Human-Friendly | 
|---|---|---|---|---|---|
| XML/XBRL | YES | YES | YES | ||
| Protocol Buffers | YES | ? | YES | YES | YES | 
| JSON | YES | ||||
| Avro | YES | YES? | YES | YES | sort of | 
| CSV | YES … | 
Someone asked:
I want to capture packets from 10Gbps network card with 0 packet loss. I am using lipcap for 100Mbps NIC and it is working fine. Will libpcap be able to handle 10Gbps NIC traffic? If not what are the other alternative ways to achive this?
I answered:
You …
more ...