Posts by Anderson Philip • 136 points
3 posts
-
3
votes1
answer69
viewsA: More secure VPN types
Solutions that use only L2TP are not indicated to traffic data through public networks, because traffic is not encrypted, the solution becomes more secure and complete when it is integrated with…
-
3
votes1
answer80
viewsA: Log storage/indexing tools
There are some centralized log storage and management systems. Two suggestions I can give you are the Graylog and the Elastic Stack. Just redirect your logs to one of these two applications, create…
loganswered Anderson Philip 136 -
3
votes1
answer171
viewsA: Memory and CPU consumption during a denial of service attack. How to understand statistics?
Hello, follow the information I got about it, I hope it helps you. Well, the "Cs" you mentioned is part of the System area and not the CPU. The corresponding CPU area goes from "us" to "st". Cs -…