Tagged articles
2 articles
Page 1 of 1
Huolala Tech
Huolala Tech
Nov 3, 2020 · Information Security

Real-Time Linux Process Auditing with Netlink Connector and ncp

This article explains how the Linux netlink connector, together with a lightweight user‑space ncp program, can audit all process events in real time, enabling detailed host security monitoring, detection of intrusion behaviors such as reverse shells, and reconstruction of attack chains through captured exec, fork, and exit data.

ConnectorHost SecurityLinux
0 likes · 12 min read
Real-Time Linux Process Auditing with Netlink Connector and ncp
ITPUB
ITPUB
Nov 16, 2015 · Information Security

5 Hidden Signs Your Web Application Is Compromised and How to Respond

The article outlines five subtle indicators of a web application breach—abnormal behavior, irregular logs, unexpected processes or users, file modifications, and warning messages—while offering practical monitoring and remediation steps to help security teams detect and mitigate attacks early.

Web Securityapplication monitoringincident response
0 likes · 7 min read
5 Hidden Signs Your Web Application Is Compromised and How to Respond