{"id":182,"date":"2007-06-19T17:28:15","date_gmt":"2007-06-19T15:28:15","guid":{"rendered":"http:\/\/security-planet.de\/2007\/06\/19\/helpim-being-dosed-by-our-own-stupid-sim\/"},"modified":"2007-06-19T17:28:15","modified_gmt":"2007-06-19T15:28:15","slug":"helpim-being-dosed-by-our-own-stupid-sim","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2007\/06\/19\/helpim-being-dosed-by-our-own-stupid-sim\/","title":{"rendered":"Help!I&#8217;m being DoS&#8217;ed by our own stupid SIM!!"},"content":{"rendered":"<p>Eine Nachricht zum Schmunzeln aus der <a href=\"http:\/\/www.securityfocus.com\/archive\/105\">Mailingliste Security-Basics<\/a> auf <a href=\"http:\/\/www.securityfocus.com\/\">securityfocus.com<\/a>:<\/p>\n<blockquote><p>Our CIO insists on using this app&#8230;   ArcSight&#8217;s Threat Response<br \/>\nManager is causing WAY more headaches then security.I don&#8217;t have time to<br \/>\ndo what I should be doing,because this BEAST thinks normal network<br \/>\nactivity is hostile!<\/p>\n<p>A weapon in one hand or a turd in the other,the way I see it!<\/p>\n<p>Rant over!<\/p>\n<p>Please DO NOT let anyone talk you into trying this.It finds so many<br \/>\nfalse positives,it will throttle your bandwidth to a point where it is<br \/>\nunusable!<\/p><\/blockquote>\n<p>Da hat wohl ein Entscheider gedacht, da\u00df diese System sofort out-of-the-box und ohne weiteres Feintuning laufen &#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eine Nachricht zum Schmunzeln aus der Mailingliste Security-Basics auf securityfocus.com: Our CIO insists on using this app&#8230; ArcSight&#8217;s Threat Response Manager is causing WAY more headaches then security.I don&#8217;t have time to do what I should be doing,because this BEAST thinks normal network activity is hostile! A weapon in one hand or a turd in <\/p>\n<div class=\"read-more-text\"><a href=\"https:\/\/cyber-fi.net\/index.php\/2007\/06\/19\/helpim-being-dosed-by-our-own-stupid-sim\/\" class=\"read-more\">continue reading<\/a><\/div>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[2,15],"tags":[543,554],"class_list":["post-182","post","type-post","status-publish","format-standard","hentry","category-allgemeines","category-security","tag-securityfocus-com","tag-sim"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":0,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/182\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}