Information Servlet// Import standard networking I/O packagesimport java.net.*;import java.io.*;// Enumeration from utilimport java.util.Enumeration;// Import servlet packagesimport javax.se… Read More
nodejs merge array
Problem
Im doint some nodejs fiddling with blogposts from wordpress and geotagging of theese posts. I have integrated geolite into nodejs and from wordpress i get the cli… Read More
JavaScript EventSource SSE not firing in browser
Problem
I have been developing a nodejs server to provide server-side-events for a new website I am developing in HTML5.
When I telnet to t… Read More
Log analysis is essential for understanding the effectiveness of any security solution. It can be valuable for day-to-day troubleshooting and also for your long-term understanding of how you… Read More
Traditionally, analyzing data logs required you to extract, transform, and load your data before using a number of data warehouse and business intelligence tools to derive business intellige… Read More
Cakephp 3.x On debug Mode for a specific controller or action To on debug mode for only one controller or action you should follow below steps:-First call configure into your controller at t… Read More
Get user's real IP address in Cloud9 IDE
Problem
In node.js + socket.io I use this code to get user's IP address:
var clientIP = socket.handshake.headers['x-forwarded-for'] || socket.hands… Read More
Click to rate this post!
[Total: 0 Average: 0]Splunk Time chart is applied to certain field for producing a chart. Where the time (T) used as X-axis. You can select them as… Read More
Question: How can I list client ip , port and connection ID of connections to MongoDB? I want to connect through the MongoDB command line and extract this information as I'm testing some HA… Read More
This blog helps you to know more about Geostats Command. The web traffic visualization on a geographic map using offers valuable information to know about website traffic, customer act… Read More
In this post, I demonstrate a method for collecting and sharing threat intelligence between Amazon Web Services (AWS) accounts by using AWS WAF, Amazon Kinesis Data Analytics, and Amazon Eve… Read More
Without a way to monitor the execution of the implemented application logic, you would implement features almost blindly with regard to performance. Fortunately, the Dynamics AX development… Read More
Amazon Elasticsearch Service (Amazon ES) is a fully managed service that you can use to deploy, secure, and run Elasticsearch cost-effectively at scale. The service provides support for open… Read More
Note: This blog post describes how to automatically update AWS WAF IP sets with the most recent AWS IP ranges for AWS services. This related blog post describes how to perform a similar up… Read More
Welcome back to Jscrambler 101! A collection of tutorials on how to use Jscrambler to protect your JavaScript. This tutorial covers Jscrambler version 7.2.
Introduction
Last time, on Jscram… Read More
In this post, we explain what the three most important AWS WAF rate-based rules are for proactively protecting your web applications against common HTTP flood events, and how to implement th… Read More
This blog post shows you how to use the machine learning capabilities of Amazon OpenSearch Service (successor to Amazon Elasticsearch Service) to detect and visualize anomalies in AWS WAF lo… Read More
Encryption is a process that involves translating your text, documents, images, videos, and other data into gibberish data that cannot be understood by any human or machine. It only becomes… Read More
Introduction Sometimes I see questions how to obtain an IP address for EBS logins. Before EBS 12.2.10 it wasn't an easy task. But starting from EBS 12.2.10 a new column "clientip" was added… Read More
Introduction to Logstash Geoip
logstash geoip is the plugin available as a filter plugin in logstash and has its latest version of 7.2.9 as and when the article is written. It was released… Read More
The gang of bank robbers is back in town for a second reel heist on the slot from Real Time Gaming (RTG). It will be all worth it as Cash Bandits 2 comes with two progressive jackpots, large… Read More
Immerse yourself into an Asian fantasy drama surrounding two protagonists - Niè Fēng aka Wind and Bou Ging-wan aka Cloud. Both are masters of Chinese martial arts, each with its… Read More
A sugar rush of jelly, bubble gum, and candy is waiting on a set of slot reels from Real Time Gaming (RTG). Sweet 16 with its delightful content has featured in the top RTG playing charts ev… Read More
AWS WAF is a web application firewall service that helps you protect your applications from common exploits that could affect your application’s availability and your security posture… Read More
In November 2022, AWS introduced support for granular geographic (geo) match conditions in AWS WAF. This blog post demonstrates how you can use this new feature to customize your AWS WAF imp… Read More
Splunk is a software platform that allows organizations to collect, index, and analyze machine-generated data in real-time.
It provides a powerful search and analytics engine that allows… Read More
With observIQ’s latest contributions to OpenTelemetry, you can now use free open source tools to easily monitor Cloudflare. The easiest way to use the latest OpenTelemetry tools is wit… Read More
Many of our customers use Amazon Cognito user pools to add authentication, authorization, and user management capabilities to their web and mobile applications. You can enable the built… Read More
Cloudflare R2 allows
developers to store large amounts of unstructured data and access everything
they required with zero egress fees. The S3-compatible API of R2 Storage allows
developers t… Read More
Due to the restrictions of online technologies, it is difficult to retrieve the MAC (Media Access Control) address of a client computer in PHP. For security and privacy concerns, the MA… Read More
Due to the restrictions of online technologies, it is difficult to retrieve the MAC (Media Access Control) address of a client computer in PHP. For security and privacy concerns, the MA… Read More