<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: n1g3ld0uglas2</title><link>https://news.ycombinator.com/user?id=n1g3ld0uglas2</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 15 Apr 2026 02:49:22 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=n1g3ld0uglas2" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by n1g3ld0uglas2 in "Show HN: Stratoshark, a sibling application to Wireshark"]]></title><description><![CDATA[
<p>Being able to use Wireshark in Kubernetes is super exciting. I can't wait to get started!</p>
]]></description><pubDate>Wed, 22 Jan 2025 15:33:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=42793872</link><dc:creator>n1g3ld0uglas2</dc:creator><comments>https://news.ycombinator.com/item?id=42793872</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42793872</guid></item><item><title><![CDATA[From Network Packets to Log Data: How Logray Built Upon Falco's Foundation]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation/">https://blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=39178972">https://news.ycombinator.com/item?id=39178972</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 29 Jan 2024 17:16:49 +0000</pubDate><link>https://blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation/</link><dc:creator>n1g3ld0uglas2</dc:creator><comments>https://news.ycombinator.com/item?id=39178972</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39178972</guid></item><item><title><![CDATA[New comment by n1g3ld0uglas2 in "[dead]"]]></title><description><![CDATA[
<p>Falco Talon directly interacts with Kubernetes primitives, ensuring immediate threat neutralisation while maintaining system integrity.</p>
]]></description><pubDate>Thu, 18 Jan 2024 19:09:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=39046176</link><dc:creator>n1g3ld0uglas2</dc:creator><comments>https://news.ycombinator.com/item?id=39046176</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39046176</guid></item><item><title><![CDATA[New comment by n1g3ld0uglas2 in "The evolution of system introspection from BPF to Wireshark to Falco"]]></title><description><![CDATA[
<p>Author here. Having worked with tools like Wireshark, Snort and Falco, I was always curious how these projects evolved over time. Hopefully this blog sheds some light on the advantages of Project Falco for Cloud-Native systems.</p>
]]></description><pubDate>Wed, 27 Sep 2023 15:20:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=37675955</link><dc:creator>n1g3ld0uglas2</dc:creator><comments>https://news.ycombinator.com/item?id=37675955</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37675955</guid></item></channel></rss>