lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3F8E9386.2090800@onryou.com>
From: lists at onryou.com (Cael Abal)
Subject: New Microsoft security bulletins today

>>>This tool is not bad for some *basic* monitoring: 
>>>http://www.pdxconsulting.com/sus/
>>>
>>>/paranoia mode off
>>>Grab your SUS log files and parse them through that web site... 
>>>/paranoia mode returned to normal
>> 
>> That's what I've been using..... It works well to see that all seems to 
>> be working as expected.  I was going to setup another tool that sends 
>> the log data in to a SQL server so you can have all the data in one 
>> place and work with it. (I have 2 SUS boxes so 2 sets of logs.)
> 
> Try this: http://www.susserver.com/Software/SUSreporting/

I'm dissatisfied with both.  With the first one, you're sending your 
logs out for remote processing -- that's just silly.  The second 
requires all sorts of fiddling around with sql / iis which doesn't seem 
like it's worth the effort.

I've been meaning to throw together something more streamlined (and with 
fewer prereqs) for a while now -- I guess it's time.

C


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ