January 7, 2021

Listed are different logs system that can be used and analyze for different environment and applications: OS Logs • Windows – Event Logs  • Linux – Syslog •  Application Logs  […]

NIDS is Network-based Intrusion Detection System, the tools here are used to detect if there are anomalies or suspicious behavior in our personal network. It sees traffic flow in the […]

Switchers map mac addresses of all devices in network which then maps to the switch port, locate the physical location of MACs .It also consists of ARP table (Address Resolution […]