You can’t make document alterations more convenient than editing your Radix-64 files online. With DocHub, you can access tools to edit documents in fillable PDF, Radix-64, or other formats: highlight, blackout, or erase document elements. Include text and pictures where you need them, rewrite your form completely, and more. You can download your edited record to your device or share it by email or direct link. You can also turn your documents into fillable forms and invite others to complete them. DocHub even provides an eSignature that allows you to sign and deliver documents for signing with just a few clicks.
Your records are safely kept in our DocHub cloud, so you can access them at any time from your desktop, laptop, mobile, or tablet. Should you prefer to apply your mobile phone for file editing, you can easily do so with DocHub’s app for iOS or Android.
Hi and welcome to the Azure Sentinel notebooks channel, my name is Jannie Li and I am a Software Engineer on the Microsoft Threat Intelligence team. Today Iamp;#39;m going to be talking about the guided hunting Base64 encoded Linux commands notebook. This notebook is a collection of tools for detecting malicious behavior on Linux machines, when commands are Base64 encoded. This behavior is commonly seen in crypto mining attacks. The notebook allows you to specify a workspace and highlights as well as categorizes potential malicious behavior within that workspace, allowing you to hunt and pivot on key entities. The notebook primarily utilizes Azure Sentinel Syslog data and telemetry from the MSTIC research branch of the AUOMS tool. Details on how to set those up as well as an in-depth written guide on the notebook are available in the description below, as well as on the Microsoft TechCommunity blog. To launch notebooks simply find it in the notebooks tab