Who is in Your Network?

It is not a question about if but when someone will be eavesdropping on your network. It might not be a “break in” but a “break out”! Do you know how common it is to have your applications and systems communicate out to a third party? Way too often that communication is not known to you, nor even secure.

When I moved to the USA I found a company, LogRhythm, that developed a state of the art network monitor. I rarely blog about the company I work for but with the latest freemium version of NetMonI feel that the word needs to get out.  The NetMon is a treasure for easy network forensics, understanding what is happening on the network or what has happened on your network.

Continue reading

Advertisements
Posted in NetMon, Security | Tagged , , | Leave a comment

Part 3: Why I always give Moose, Deer and Elk proper Aging Time

In the third and last part of “Why I always give Moose, Deer and Elk proper Hang Time” we will learn:

– the simple steps needed to process the meat in your home

– what the meat aging (tenderization) formula is and the connection between time and temperature. No more guesswork as to when it is done aging!

– how to calculate aging with and without a tenderization timer

– my own, personal reflections regarding how good aged meat from a moose cow compares to a less aged moose calf.

Once this third part is read you should know how the meat goes from tough to tender, from flavorless to rich in flavor and how you, in easy to do steps, can transform your meat to high quality, aged, flavorful and tender steaks worthy of a 5 star dinner experience

. https://www.jagareltd.com/blog/2017/9/2/part3-why-i-always-give-moose-deer-and-elk-proper-hang-time

Posted in Hunting | Tagged , , , | Leave a comment

Part 2: Why I always give Moose, Elk and Deer proper aging time

In part 2 of “Why I always give Moose, Deer and Elk proper Hang Time” we will move on to the techniques needed to make the meat go from tough to tender, from flavorless to rich in flavor.

We will discuss the PROs and CONs with dry aging vs wet aging (a.k.a vacuum aging)

Aging the meat is the key regardless of approach ūüôā

https://www.jagareltd.com/blog/2017/9/1/why-i-always-give-moose-deer-and-elk-proper-hang-time-part-2

Posted in Hunting | Leave a comment

Part 1: Why I always give Moose, Elk and Deer proper aging time

When I started out as a hunter in the North of Sweden I was fortunate enough to hunt with various groups of hunters. They all had  decades worth of  knowledge and traditions on:  how to field dress the animal, how long the moose or deer should hang and how to butcher it. I quickly realized that the processed meat quality differed sharply between the groups and I set out to learn what made the processed meat high quality vs inferior quality.

In my article at JagareLtd.com we will learn to avoid some common handling mistakes and why aging the meat makes a difference.   If you are a DIY hunter like me than I think you will find it an interesting read.

Posted in Hunting | Leave a comment

NetMon Freemium – Use case : Detect non-encrypted logins

This is one of the few times  that I have written about a product for a company that I am working for. NetMon, or Network Monitor by LogRhythm is in my opinion well warranted all the extra PR and I hope by writing about it I can interest you in trying it out. In just a few minutes you could get full visibility into your corporate or home network.

Let me show you one great use case of where NetMon truly shines. From it I think you will see how using NetMon will increase the visibility of what happens on your network and how it can detect vulnerabilities that no virus scanner or malware detection tool will detect. This is something that you can use on your home network as well as on your company network.

The use case is detecting unencrypted logins. Obviously with unencrypted logins on your network you are extra vulnerable if a hacker manages to get pass your firewall and starts sniffing network traffic. Detecting clear text credentials from the services you use on the internal network is vital when securing your network.

Continue reading

Posted in NetMon, Security, Uncategorized | Leave a comment

g3log 1.3 and g3sinks 1.1 released.

G3log v.1.3

  • with improvements for ARM, OSX, Linux and Windows platorms.
  • Nanosecond fractions granularity in log entries
  • plattform and build improvements
  • logging levels improvements
  • bugfixes – API, README updated with build instructions and more code examples.

G3Sinks v.1.2

  • improved log rotation triggered by size of log file or number of entries
  • g3log integration¬†improvements
  • improved README (logrotate) with build, install instructions
  • improved README for g3log integration and API usage.

Continue reading

Posted in C++, G2log, g3log, g3sink, logger, Uncategorized | 2 Comments

Ideone.com now, again, with async support

finally Ideone.com got its thread support back again!

Something like this would have failed a week ago
http://ideone.com/RGYJps

#include <iostream>
#include <thread>

using namespace std;
int main() {
   auto func = [](string input)  {
      cout << input << ", from " << __FUNCTION__ << endl;
      };
   
   func("non threaded");
   auto id = thread(func, "from thread");
   id.join();
   return 0;
}
Posted in Uncategorized | Leave a comment