syd@lemy.lol to Technology@lemmy.worldEnglish · edit-21 年前15M Trello accounts have been leakedlemy.lolimagemessage-square102fedilinkarrow-up1617arrow-down114file-textcross-posted to: [email protected]
arrow-up1603arrow-down1image15M Trello accounts have been leakedlemy.lolsyd@lemy.lol to Technology@lemmy.worldEnglish · edit-21 年前message-square102fedilinkfile-textcross-posted to: [email protected]
minus-square_dev_null@lemmy.zxcvn.xyzlinkfedilinkEnglisharrow-up3·1 年前Get something like splunk to do it. I’m wondering what the rules for this might look like, especially if this was e.g. distributed scraping.
minus-squaretsonfeir@lemm.eelinkfedilinkEnglisharrow-up2·1 年前With a site that active, they really need something that can’t identify strange traffic patterns. Hell, maybe they do but no one cared to do anything. Maybe no one listens to IT… that never happens /s
Get something like splunk to do it. I’m wondering what the rules for this might look like, especially if this was e.g. distributed scraping.
With a site that active, they really need something that can’t identify strange traffic patterns. Hell, maybe they do but no one cared to do anything. Maybe no one listens to IT… that never happens /s