query logo white
  • Query logo
  • Products
    • Query Federated Search
    • Query Federated Search for Splunk
    • AI Agents
    • Security Data Pipelines
  • Platform
    • The Future is Federated
    • Federated Search
    • Connectors
    • Documentation
  • Use Cases
    • Compliance
    • Incident Response
    • Security Investigations
    • SIEM Migration
    • Splunk Cost Reduction
    • Threat Hunting
    • Examples
      • Amazon Security Lake
      • CrowdStrike/S3
      • EDR Data
  • Resources
    • Blogs
    • Datasheets
    • Events
    • Newsroom
    • Videos
    • Webinars
    • White Papers
  • Company
    • About Us
    • Partners
      • Splunk Services Partner Program
    • Leadership
    • Board of Directors
    • Careers
  • Book a Demo

Author: Dhiraj Sharan

Chief Scientist & Founder, Query
Man typing

Blogs

Hands-on with OpenSSL

December 2, 2020 / March 22, 2023 by Dhiraj Sharan

Introduction Today’s most widely used security toolkit is OpenSSL, not only due to its licensing terms (including a commercial use with no restrictions whatsoever) but due to its rich plethora of facilities and building blocks we can use to build any sophisticated cryptosystem. It is also a rich learning tool, and despite its serious nature, […]

Read more »

How to Monitor Endpoints Live with Osquery

Blogs

How to Monitor Endpoints Live with Osquery

November 4, 2020 / April 21, 2023 by Dhiraj Sharan

Picture this – you are coming from a database background and getting into the world of IT monitoring or administration. While you are newly warming up to the Linux command line, you have to deal with Windows and Mac machines in your network. Add to that a bunch of Linux servers in your company’s data […]

Read more »

The Crypto Magic Behind OpenSSL

Blogs

The Crypto Magic Behind OpenSSL

September 30, 2020 / February 16, 2023 by Dhiraj Sharan

We talked about introductory OpenSSL in a previous blog Dipping Our Toes into OpenSSL, that covered how it supports rich cryptographic-centric operations, which are needed for all sorts of things in the security domain and even outside of it. Today, let’s take the next step and understand some of the crypto arithmetic behind it, without […]

Read more »

Creating a Secure Encrypted Channel with Socat

Blogs

Creating a Secure Encrypted Channel with Socat

September 16, 2020 / February 16, 2023 by Dhiraj Sharan

Socat — the tool of choice for proxies and networking pipes. In prior blogs, our team has written about tools like netcat, Nmap, and Zeek that network security engineers widely use. Security analysts and threat hunters use these tools to help with their daily tasks. So this time let’s talk about socat. Socat is the […]

Read more »

Black Cat

Blogs

How to Use Netcat for Cybersecurity

August 5, 2020 / February 16, 2023 by Dhiraj Sharan

To start a career as a security analyst, one must have a good understanding of the network and knowledge of networking tools. Let’s begin with netcat. One can do amazing things with netcat (nc), the super tool of Linux command line experts for several decades now. This article aims to equip you with some of […]

Read more »

Man looking at Machine

Blogs

Dipping our toes into OpenSSL

June 23, 2020 / March 22, 2023 by Dhiraj Sharan

What would life be without OpenSSL, can we even imagine one! By definition, OpenSSL is an open-source crypto library implementing SSL and TLS protocol RFCs. It is quite easy to use OpenSSL for several routine tasks that we need in the everyday usage of crypto, and other daily need-to-knows of programmers. By understanding command-line options, […]

Read more »

People Discussing

Blogs

Checklist for Securing your home-grown IT applications

June 9, 2020 / February 16, 2023 by Dhiraj Sharan

A software application is a program or multiple programs that help end-users. Most applications use network resources, database resources, storage, and other cloud resources, to function. This connectedness is vital to keep in mind, not only how your end user may interact with the application, but also how vulnerable the application may be to malicious […]

Read more »

Girl holding Mug

Blogs

Working Under Supervision

April 16, 2020 / March 22, 2023 by Dhiraj Sharan

Introduction Like it or not, most of us have a boss, and thus, we work under supervision. Our boss’s job is to make sure we stay focused and complete our work. We have quotas to fulfill and projects to complete. They know what the desired and expected outcomes are, the same way data scientists understand […]

Read more »

Man eating and looking at screen

Blogs

Looking further into Machine Learning using Python

March 3, 2020 / September 26, 2024 by Dhiraj Sharan

Overview of scikit-learn    Python has a very advanced machine learning toolkit called scikit-learn, or sklearn for short. sklearn is useful for nearly all of the machine learning and artificial intelligence projects we do today, with one drawback. In essence, it does not support, nor does it plan to support, reinforcement learning. So for nearly 90% of […]

Read more »

Camera

Blogs

Data Security – Threats and Challenges in today’s world

February 4, 2020 / March 22, 2023 by Dhiraj Sharan

Abstract In this blog series, we cover topics relevant to folks who are starting a career in cybersecurity. If you are one, you probably have had some exposure to cybersecurity best-practices in your personal life from a consumer perspective. Starting a cybersecurity career then challenges you to bridge your existing knowledge to your work life, […]

Read more »

Page navigation
  • «
  • ‹
  • Page 3
  • Page 4
  • Current Page 5
  • Page 6
  • ›
COMPANY

Product

About

Careers

Partners

Leadership

Board of Directors

RESOURCES

Documentation

Blogs

Events

Newsroom

Videos

Webinars

White Papers

LEGAL

BETA Terms

Data Processing Agreement

Privacy & Cookie Policy

Security Protocols

Service Level Agreement

Subprocessors

Support Agreement

Terms and Conditions

CONTACT

Book a Demo

Contact Sales

query on linkedinquery on Xquery on youtube


Query

3423 Piedmont Road NE
• Atlanta, GA 30305
©2025 Query, All Rights Reserved.