Found this awesome image today which shows a diagram and list of tool used for *unix performance monitoring and where each tool fits into the stack.
Source: brendangregg.com
UA-67857327-1
CYBER DEFENCE PROFESSIONAL // MCIIS, CITP, MBCS, CISSP, CISM, CCSP, CASP
Found this awesome image today which shows a diagram and list of tool used for *unix performance monitoring and where each tool fits into the stack.
Source: brendangregg.com
Although a play on the recent privacy nightmare for many celebrities, this site and research is very interesting as they have performed the first successful collision attack on the SHA-1 hashing algorithm
Source: The Shappening