2023-04-28 15:54:33 +0000 | received badge | ● Famous Question (source) |
2021-12-12 22:05:30 +0000 | received badge | ● Notable Question (source) |
2021-12-12 22:05:30 +0000 | received badge | ● Popular Question (source) |
2021-09-22 12:29:39 +0000 | received badge | ● Popular Question (source) |
2021-06-18 12:24:27 +0000 | commented question | capture filter for deprecated SSL/TLS protocols Embarrassing... It turns out I didn't apply the capture filter properly. The machine we test on has several interfaces, |
2021-06-18 09:06:00 +0000 | commented question | capture filter for deprecated SSL/TLS protocols I'm using the capture filter as described on the webpage. "TLS version < 1.2" means 'less than', so in my book that's |
2021-06-17 08:19:48 +0000 | asked a question | capture filter for deprecated SSL/TLS protocols capture filter for deprecated SSL/TLS protocols We're trying to identify applications which are still connecting to our |
2019-09-23 08:31:57 +0000 | commented answer | capture only destination IPs Based on your notes I'm reviewing my filter. I've now reverted back to using tcp[13]=18 (same syntax as our Linux guys u |
2019-09-23 07:54:45 +0000 | commented answer | capture only destination IPs Interesting point. However, I can't deviate from our Linux team's way of working too much if we want to re-use their po |
2019-09-20 07:13:34 +0000 | commented question | capture only destination IPs ok, thanks, that's indeed a good option. I'll test if our tool to analyze the pcaps still works when I added '-s 64' in |
2019-09-19 11:00:57 +0000 | asked a question | capture only destination IPs capture only destination IPs We're preparing a mass migration of servers to a completely new network. To build an overvi |