Chapter

Searching Through Access Logs
listen on Spotify
12:40 - 16:54 (04:13)

Engineers search through server access logs to identify potential security breaches by analyzing user agent data. Implementing password hash salting provides another layer of security to protect against brute-force attacks.

Clips
In this episode, the hosts discuss how engineers can investigate cyber attacks using logs and user agents, as well as the benefits of salting password hashes for added security.
12:40 - 16:54 (04:13)
listen on Spotify
Cybersecurity
Summary

In this episode, the hosts discuss how engineers can investigate cyber attacks using logs and user agents, as well as the benefits of salting password hashes for added security.

Chapter
Searching Through Access Logs
Episode
86: The LinkedIn Incident
Podcast
Darknet Diaries