syd@lemy.lol to Technology@lemmy.worldEnglish · edit-29 months ago15M Trello accounts have been leakedlemy.lolimagemessage-square102fedilinkarrow-up1617arrow-down114file-textcross-posted to: [email protected]
arrow-up1603arrow-down1image15M Trello accounts have been leakedlemy.lolsyd@lemy.lol to Technology@lemmy.worldEnglish · edit-29 months agomessage-square102fedilinkfile-textcross-posted to: [email protected]
minus-square_dev_null@lemmy.zxcvn.xyzlinkfedilinkEnglisharrow-up3·9 months agoGet something like splunk to do it. I’m wondering what the rules for this might look like, especially if this was e.g. distributed scraping.
minus-squaretsonfeir@lemm.eelinkfedilinkEnglisharrow-up2·9 months agoWith a site that active, they really need something that can’t identify strange traffic patterns. Hell, maybe they do but no one cared to do anything. Maybe no one listens to IT… that never happens /s
Nobody watches sever logs 😞
Get something like splunk to do it. I’m wondering what the rules for this might look like, especially if this was e.g. distributed scraping.
With a site that active, they really need something that can’t identify strange traffic patterns. Hell, maybe they do but no one cared to do anything. Maybe no one listens to IT… that never happens /s