NewsFlash – PyU4V 3.0 Released

PyU4V has just had a new release, for customers new to REST API and VMAX you’re in a great place as the new release is easier to get started with and documentation has improved (by improved I mean exists). Because of this my blog post will be short with the links and a quick video to show how to install and make a REST call.using one of the pre-built functions.

Welcome to PyU4V’s documentation! — PyU4V 3.0.0 documentation All of the packages functions are documented here along with detailed instructions on how to get going.

Note, there are a few fundamental changes in how the new package is structured which makes scripts written with 2.0 version incompatible. The reasons for doing this will be obvious once you start to work with it, but the net result is better error handling, consistency across functions, and better organisation for future maintenance.

The functions are divided up into categories – common, provisioning, replication, and performance.

  • Common covers a few utils and also covers system calls
  • Provisioning covers all things provisioning and masking related, and corresponds with the ‘sloprovisioning’ endpoints
  • Replication covers local and remote replication
  • Performance covers all the performance related calls.

The example scripts used in my previous posts have been converted to use the new library so check those out on

Hopefully there is less of a learning curve with this implementation, A big shout out to Ciara Stacke and Michael McAleer who did all the conversion work on this, you guys rock.


  • No Related Posts

Vulnerable shopping sites 2017

Santa’s beard is usually white, the colour of purity and innocence. Check Point Finds Vulnerability in Online Shopping. . php?ID=200302309%27; http://www. com/video/player. These sites are chosen randomly using Jan 11, 2016 SQL vulnerable shopping websites 2016 list. SQL Injection Dorks. Nov 16 …


  • No Related Posts

How to set sql parameters

This part is the problem: Where hasta_id=’@hastaid’. That’s not using a parameter – that’s searching for rows where the value of hasta_id is exactly the string @hastaid , because you’ve put it in a string literal. You need to get rid of the quotes: Where hasta_id=@hastaid. Then it’s looking for rows where …


  • No Related Posts

How to deal with pdo errors

Is it better to have disabled the error reporting in the php.ini file, or even do something like setAttribute(PDO::ERRMODE_SILENT). instead of the catch statement, or is it better to do a combination of above and redo the catch statement so it doesn’t return the error to the user. security pdo sql-injection.


  • No Related Posts

Eleven new organisations join Hyperledger blockchain project

Eleven new organizations have joined Hyperledger, an open-source collaborative initiative to advance cross-industry blockchain technologies.

The announcement comes on the heels of the second milestone launch of production ready blockchain framework, Hyperledger Sawtooth 1.0. Hyperledger incubates nine business blockchain and distributed ledger technologies, including Hyperledger Fabric, Hyperledger Iroha, Hyperledger Indy, Hyperledger Burrow, Hyperledger Quilt and Hyperledger Sawtooth, among others.

The latest general members include 8Common, ArcBlock, Data Deposit Box, FORFIRM, ForgeRock, Inspur, Nexiot, ~sedna GmbH, Smart Block Laboratory. Associate members joining this month include: Peking University and

“It’s very gratifying to see the momentum behind Hyperledger continue in 2018, two years after the project first started,” said Brian Behlendorf, Executive Director, Hyperledger. “The community’s development efforts have led us to release two production-ready frameworks and we’ve grown to more than 200 members in that time. Members add a great amount of value to our ecosystem and I look forward to contributions by this new set of organizations as more production deployments take shape later this year.”

Hyperledger aims to enable organizations to build robust, industry-specific applications, platforms and hardware systems to support their individual business transactions by creating enterprise-grade, open source distributed ledger frameworks and code bases. It is a global collaboration of more than 200 organizations including leaders in finance, banking, IoT, supply chain, manufacturing and technology.

The inaugural Hyperledger Global Forum is scheduled to take place later this year, December 12-15 in Basel, Switzerland.

EconoTimes 中文版 经客时代已上线


开始阅读 >

Econotimes China Edition



ATP Endpoint – new features

I need a solution

Is there any more detailed guide or white paper on below features?

e.g what specific rule or signature being used to detect suspicious powershell ? and which part of SEP this signature being added…IPS/ADC?

The following tasks can now be performed in near real-time using EDR 2.0:

  • Delete file

  • Endpoint search

  • Endpoint data recorder search¹ and full and process dumps

  • Ability for ATP to receive data from endpoints about the following events and activities:¹


    • Suspicious PowerShell executions

      Consists of suspicious PowerShell executions

    • Load point changes

      Consists of suspicious modifications to load points

    • Suspicious system activity

      Consists of the suspicious activity events that various rules detected

    • Heuristic detections

      Consists of heuristically-detected events of a certain order of the system activity events that are known to occur when malware is executed

    • Process launch activity

      Consists of most of the total process launch events that are generated


      Selecting this option can place a high demand on network resources.

    • Process terminate activity

      Consists of most of the total of the process terminate events that are generated



  • No Related Posts