This page details the hardening of SSH.
To display available algorithms for a specific SSH client
ssh -Q cipher ssh -Q cipher-auth ssh -Q mac ssh -Q kex ssh -Q key
To audit in a passive manner the SSH servers and clients …
more ...Doing a bit of research with regard to data schema and serializaton, preferably without being JSON_centric.
Name | Defining Structure/Type | Structure is Extensible | Data Serialization | Data Validation | Human-Friendly |
---|---|---|---|---|---|
XML/XBRL | YES | YES | YES | ||
Protocol Buffers | YES | ? | YES | YES | YES |
JSON | YES | ||||
Avro | YES | YES? | YES | YES | sort of |
CSV | YES … |
Someone asked:
I want to capture packets from 10Gbps network card with 0 packet loss. I am using lipcap for 100Mbps NIC and it is working fine. Will libpcap be able to handle 10Gbps NIC traffic? If not what are the other alternative ways to achive this?
I answered:
You …
more ...