@[email protected] to TechnologyEnglish • edit-210 months ago15M Trello accounts have been leakedlemy.lolimagemessage-square102fedilinkarrow-up1617arrow-down114file-textcross-posted to: [email protected]
arrow-up1603arrow-down1image15M Trello accounts have been leakedlemy.lol@[email protected] to TechnologyEnglish • edit-210 months agomessage-square102fedilinkfile-textcross-posted to: [email protected]
minus-square@[email protected]linkfedilinkEnglish3•10 months agoGet something like splunk to do it. I’m wondering what the rules for this might look like, especially if this was e.g. distributed scraping.
minus-square@[email protected]linkfedilinkEnglish2•10 months agoWith a site that active, they really need something that can’t identify strange traffic patterns. Hell, maybe they do but no one cared to do anything. Maybe no one listens to IT… that never happens /s
Nobody watches sever logs 😞
Get something like splunk to do it. I’m wondering what the rules for this might look like, especially if this was e.g. distributed scraping.
With a site that active, they really need something that can’t identify strange traffic patterns. Hell, maybe they do but no one cared to do anything. Maybe no one listens to IT… that never happens /s