tag:blogger.com,1999:blog-4088979.post1879789412590318343..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Thoughts from Black Hat USA 2009Richard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-4088979.post-21289850344981977842009-08-12T04:25:25.149-04:002009-08-12T04:25:25.149-04:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-45261018036925844152009-08-07T03:11:30.932-04:002009-08-07T03:11:30.932-04:00your blog is niceyour blog is niceZamankhanhttps://www.blogger.com/profile/13386731800837618916noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-35315785546844438722009-08-05T09:13:19.745-04:002009-08-05T09:13:19.745-04:00Anonymous, I forgot to mention that www.syslog.org...Anonymous, I forgot to mention that www.syslog.org/logged has some potentially useful posts on this subject.Richard Bejtlichhttps://www.blogger.com/profile/13512184196416665417noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-78130069944538696032009-08-05T09:11:07.014-04:002009-08-05T09:11:07.014-04:00Thanks Anonymous. I don't have a good answer ...Thanks Anonymous. I don't have a good answer for this using open source tools. I've been doing some research but nothing jumps out at me.Richard Bejtlichhttps://www.blogger.com/profile/13512184196416665417noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-74648475458010500392009-08-04T22:40:02.588-04:002009-08-04T22:40:02.588-04:00I was actually in your second class for TCP/IP Wea...I was actually in your second class for TCP/IP Weapons this year and it was great. I meant to ask you if you knew of any ways to get windows event logs to a splunk box over an encrypted channel or at least over TCP.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-45522413324831323652009-07-31T12:37:47.026-04:002009-07-31T12:37:47.026-04:00Certainly agree that Apple has to improve on reduc...Certainly agree that Apple has to improve on reducing the "window of exposure" with regards to known vulnerabilities (especially since they use many third-party packages that have obvious visibility as to when and what got patched).<br /><br />On the other hand, they do have a product security team (i.e. http://www.apple.com/support/security/) and in my book are top notch, but unfortunately it appears that their marketing department rules the roost when all thing are said and done (just an observation from one of their customers).Anonymousnoreply@blogger.com