Jan 6, 2023 | Articles, Articles, Articles, Articles
Facebook. Twitter. Instagram. LinkedIn. YouTube. Pinterest. Mastodon. The list goes on. Whether you love or loathe social media, these platforms have become integral to how we communicate as individuals and businesses. Cybercriminals have also taken note, embracing...
Dec 28, 2022 | Uncategorized
As I do each year, I recently got together with a number of my very talented colleagues at Quest to think about key trends and lay out our IT predictions for the coming year. Since we specialize in Active Directory and cyber resilience, we were particularly interested...
Dec 21, 2022 | Uncategorized
Welcome to the second part of my syslog-ng tutorial series. In this part, we cover some of the basic concepts behind syslog-ng. You can watch the video or read the text below. Link: https://youtu.be/unXX69XUtnE What is syslog-ng? Last time we defined syslog-ng as an...
Dec 20, 2022 | Uncategorized
Welcome to the first part of my syslog-ng tutorial series. In this part, I give you a quick introduction what to expect from this series and try to define what syslog-ng is. Before introducing you to syslog-ng, let me introduce myself in a few words. I am Peter Czanik...