 And today we are going to have a slightly different as well as an interesting talk because we are going to talk about security. So before we start, how many of you have heard about free charge? Oh, mostly everyone. Nice. So free charge is rated as one of the most secured startups in India. This essentially means that we have a proper defense in depth based approach throughout our infrastructure. And one of the tools that we use, which is very important in our defense in depth based layering model is OSSEC. And today, today's talk is going to be about OSSEC. OSSEC is basically a host based intrusion prevention system, and it is one of the most awesome tools to work with. So let me give you an example. So what makes OSSEC a bit different from a traditional host based intrusion detection is the capabilities of active response. So let's explore on what active response means. So in a traditional IDS model or you have a, let's say you have a file integrity monitoring in your environment and you find some user has modified a particular critical configuration file. So what a traditional integrity monitoring software can do is all it can do is it will alert you that this file has been modified and that is it. But in a critical production environment, you need something more and you need a active response which OSSEC provides. So let's take an example where a critical configuration file is modified. Now OSSEC does the integrity checking. So it will immediately alert us that this configuration file is modified. One thing that it can also additionally do is it can actually block the user from the system who actually modified a configuration file. So depending on the rules that we write in the OSSEC, it will do an active response in the corresponding to the event that has occurred. Now I'll give you a real world scenario in my own website. We have around 10,000 users visiting every day and we use Nginx along with Naxi as a web application firewall. Now every day we get around 200 to 300 SQLI based injection attacks. Now Naxi by default does not block attackers who are doing a web application attacks. So what I have done with OSSEC is OSSEC can parse the log file of Naxi. It checks if there is a string called SQLI or which means SQL injection. Corresponding to the string, there is also an IP address associated. So what OSSEC does is as soon as it reads a log with the IP address associated with a SQLI string, it immediately configures the IP tables to block that particular IP address. And this becomes so much simple. So as soon as someone tries to do a SQL injection attack on your system, immediately OSSEC will block that particular attacker from the IP tables. And this essentially is the second most important characteristic of OSSEC which is log monitoring. It can actually parse the log files and do a certain action depending on the event that has occurred. Now these are the two important features of OSSEC. One is the active response, second is the log monitoring. It also does root checking as well as lot of other things related to system audit events. So again OSSEC is one of the very important tools it can actually monitor the net stat. So it will monitor the net stat every five seconds. And if there are any processes which are associated with a port, it will actually alert you immediately on the email that a particular process has started or has binded to a port. And if you have written an event, it will actually block the port itself from the firewall. So again for those who have not used OSSEC, I would really recommend that you use OSSEC in your production environment. That is one of the most amazing tools to work with. So this is it. I just had five minutes for this flash talk. Again for those who are interested in security as well as DevOps, we have great openings in free charge. You can come over to our booth. Thanks.