this post was submitted on 10 Nov 2025
344 points (100.0% liked)

Hardware

4437 readers
186 users here now

All things related to technology hardware, with a focus on computing hardware.


Rules (Click to Expand):

  1. Follow the Lemmy.world Rules - https://mastodon.world/about

  2. Be kind. No bullying, harassment, racism, sexism etc. against other users.

  3. No Spam, illegal content, or NSFW content.

  4. Please stay on topic, adjacent topics (e.g. software) are fine if they are strongly relevant to technology hardware. Another example would be business news for hardware-focused companies.

  5. Please try and post original sources when possible (as opposed to summaries).

  6. If posting an archived version of the article, please include a URL link to the original article in the body of the post.


Some other hardware communities across Lemmy:

Icon by "icon lauk" under CC BY 3.0

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Cypher@lemmy.world 4 points 5 days ago (1 children)

I check those logs, not for Intel though.

The systems that support this range from simple to unnecessarily complex.

[–] Valmond@lemmy.world 0 points 5 days ago (1 children)

Are you paid to check file access logs?

[–] Cypher@lemmy.world 7 points 5 days ago

Yes that’s a small part of my job.

I setup monitoring systems, ingest logs and create rules to detect unusual or malicious behaviour.

Then I perform investigations which sometimes turn into forensic investigations, which sometimes results in legal action.