Monday, February 3, 2020

VMware vSphere 6/6.5 Key 序列号

vSphere 6 Hypervisor
  • HY0XH-D508H-081U8-JA2GH-CCUM2
  • 4C4WK-8KH8L-H85J0-UHCNK-8CKQ8
  • NV09R-2W007-08D38-CA956-33U28
  • JU400-6EK4L-080V9-QT8EP-2KAQ2
vSphere 6 Hypervisor for Embedded OEMs
  • NC6HH-26J4N-48098-Y0AX0-1GA66
  • HY0J0-6L28H-081W8-4TCN0-32RP0
  • 0V012-002DJ-480T1-UHAE0-9GULF
  • 4G6WR-A0K4M-08420-J8CN6-8A2QA

Saturday, December 14, 2019

Top Six Communicating Skills - Listening, Coaching, Teaching, Guiding, Advising, Motivating

As a leader, one of the most critical skills you need to develop is the ability to adapt your communication style based on situational needs. When you’re able to use the right communication tools, you’re able to help your team reach peak performance. There’s nothing more powerful than communicating in a way that truly resonates with your employees. Let’s take a look at the six key communication styles that every leader should have in their toolbox.
Listening should be the most used form of communication for every leader. There’s no ideal ratio of listening to speaking, but the scale should always tip at least slightly in favor of listening. Listen to not only what your team is explicitly saying, but what they’re not saying as well. Listening between the lines allows you to uncover your team’s hidden frustrations and challenges. When you’re truly hearing what your employees are telling you, you’ll have all the information you need to evaluate the situation and respond with the most effective method of communication.

Coaching (Learning & Sharing)

Thursday, December 5, 2019

Building a Malware Analysis Lab: Become a Malware Analysis Hunter in 2019

As time goes by, criminals are developing more and more complex methods of obscuring how their malware operates, making it increasingly difficult to detect and analyze. The list of tactics used is seemingly endless and can include obfuscation, packers, executing from memory with no file drop, and P2P botnet architecture with frontline command and control servers (C2s) and gateways being compromised websites. Add to these tactics the concerns about Domain Generations Algorithms (DGA), Fast Flux and Dynamic DNS, and you complicate the mix even further.
Tracking all of these elements might be difficult, but in all honesty, you don't need 10 years of experience in malware analysis and a bunch of certificates to help you win this battle. You just need to experiment. One great way to learn about malware is to build your own home lab and play with actual malware samples within this environment. This can be a fun and educational project even if you are not an InfoSec pro. If you do happen to be an InfoSec pro, the things you learn in your home lab just might help you do your job more effectively. So how do you set one up? A few simple guidelines will get you started.

What Should Be In Your Malware Analysis Lab?

Tuesday, November 26, 2019




Saturday, November 16, 2019



如下我发现的: ,数据啊,只有你想不到的,没有它搜索不到的

Friday, November 15, 2019

Syslog Analysis Website or Tools

1. Retrace–one of Stackify’s developer tools, and the only developer tool that combines APM, errors, metrics, and monitoring with logging to provide a fully-integrated, multi-environment tool that gives you app performance superpowers.
2. Loggly–this is a cloud-based management and analytics service provider that has a free and paid plan starting at $49 per month. With their dynamic field explorer, you get a bird’s eye view of your logs. It also comes with power full-text searches.
3. GoAccess–this is a terminal-based log analyzer that lets you view web server statistics in real time. It is also open source and free to use. Plus, it is available on Github.
4.–this tool has free and paid plans starting at $89 per month. It has an interface powered by Kibana that lets you search through millions of records easily. You can also filter your results with custom parameters.
5. Splunk–this is a popular tool that has been around since 2003. It also comes in free and paid plans. The paid plan pricing depends on the amount of volume your process. In addition, it comes with powerful drill-downs that let you go back in time with ad-hoc queries.