Logfile analysis with awk and grep
Most security work, in practice, is reading log files. The tools you need are about thirty years old. Here is what I have learnt about driving them.
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Showing posts tagged awk — 1 result.
Most security work, in practice, is reading log files. The tools you need are about thirty years old. Here is what I have learnt about driving them.