<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Gallery - Nyroxis – Personal Endpoint Security</title>
	<atom:link href="https://www.nyroxis.fr/category/gallery/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.nyroxis.fr</link>
	<description>Where Enterprise Security Cannot Reach, Nyroxis Begins.</description>
	<lastBuildDate>Tue, 12 Aug 2025 20:17:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.nyroxis.fr/wp-content/uploads/2025/08/cropped-site-icon-32x32.png</url>
	<title>Gallery - Nyroxis – Personal Endpoint Security</title>
	<link>https://www.nyroxis.fr</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How Our Offline Log Collection Works</title>
		<link>https://www.nyroxis.fr/how-our-offline-log-collection-works/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-our-offline-log-collection-works</link>
		
		<dc:creator><![CDATA[support rainbow]]></dc:creator>
		<pubDate>Sun, 15 Aug 2021 20:54:52 +0000</pubDate>
				<category><![CDATA[Gallery]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Offline]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://rainbowit.net/themes/inbio/?p=123</guid>

					<description><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-768x768.jpg 768w, https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-600x600.jpg 600w, https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-100x100.jpg 100w, https://www.nyroxis.fr/wp-content/uploads/2021/08/news01.jpg 1024w" sizes="(max-width: 150px) 100vw, 150px" /><p>In cybersecurity, speed is critical — but so is discretion. Nyroxis’s Offline Log Collection system was designed to capture and store essential evidence without relying on internet connectivity or external servers. This means that whether you’re in a sensitive government facility, an air-gapped corporate network, or a personal environment with no online connection, your logs [&#8230;]</p>
<p>The post <a href="https://www.nyroxis.fr/how-our-offline-log-collection-works/">How Our Offline Log Collection Works</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-768x768.jpg 768w, https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-600x600.jpg 600w, https://www.nyroxis.fr/wp-content/uploads/2021/08/news01-100x100.jpg 100w, https://www.nyroxis.fr/wp-content/uploads/2021/08/news01.jpg 1024w" sizes="(max-width: 150px) 100vw, 150px" /><p>In cybersecurity, speed is critical — but so is discretion. Nyroxis’s <strong>Offline Log Collection</strong> system was designed to capture and store essential evidence without relying on internet connectivity or external servers. This means that whether you’re in a sensitive government facility, an air-gapped corporate network, or a personal environment with no online connection, your logs are still recorded, preserved, and ready for analysis.<br></p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="800" height="600" src="https://nyroxis.com/wp-content/uploads/2025/08/nyroxis-portfolio-08.jpg" alt="" class="wp-image-5410" srcset="https://www.nyroxis.fr/wp-content/uploads/2025/08/nyroxis-portfolio-08.jpg 800w, https://www.nyroxis.fr/wp-content/uploads/2025/08/nyroxis-portfolio-08-300x225.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2025/08/nyroxis-portfolio-08-768x576.jpg 768w, https://www.nyroxis.fr/wp-content/uploads/2025/08/nyroxis-portfolio-08-600x450.jpg 600w" sizes="(max-width: 800px) 100vw, 800px" /><figcaption class="wp-element-caption">Image Caption</figcaption></figure>
</div>


<p>Here’s how it works, step by step:</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>1. Local Event Capture</strong><br>The Nyroxis agent runs silently in the background, monitoring key security events such as process launches, USB insertions, file integrity changes, and keyword triggers in PowerShell or terminal commands. Unlike cloud-based monitoring, all data is captured <strong>locally</strong> — no packets leave your network, eliminating the risk of interception.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>2. Real-Time Threat Tagging</strong><br>As each event is recorded, Nyroxis applies its rule-based and heuristic detection models to assign a severity level (Critical, Warning, Info). This ensures that when the logs are reviewed later, the most urgent events stand out immediately.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>3. Encrypted Local Storage</strong><br>Every log entry is stored in a secure, encrypted SQLite database directly on the machine. Even if the device is stolen or accessed without permission, the logs remain protected and unreadable without the proper encryption keys.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>4. Stealth Mode Operation</strong><br>During collection, there are no pop-ups, notifications, or visible activity that could alert an attacker. This silent approach allows Nyroxis to continue gathering valuable evidence without tipping off the threat actor.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>5. Periodic Evidence Backups (Optional)</strong><br>For VIP clients, Nyroxis offers a secure monthly service where our analysts collect the encrypted log files, analyze them in our Security Lab, and deliver a tailored security report — highlighting potential breaches, anomalies, and policy violations. This is done through encrypted physical transfer or secure offline methods, ensuring no data exposure.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>6. Offline Analysis Ready</strong><br>When you or your security team are ready to investigate, the logs can be decrypted and loaded into the Nyroxis dashboard — either on the same machine or an isolated forensic workstation. This provides a <strong>full forensic timeline</strong> of activity, complete with timestamps, source information, and threat categorizations.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>When the network goes dark, Nyroxis keeps watching.</p>
</blockquote>



<p><strong>Why Offline Collection Matters</strong><br>Online monitoring solutions can be powerful, but they depend on internet access — and attackers know this. A well-timed disconnection or a firewall rule can block cloud-based security tools from sending alerts. Nyroxis eliminates this weakness by making sure that <strong>even without internet, your evidence is safe, complete, and admissible in court.</strong></p>



<p></p><p>The post <a href="https://www.nyroxis.fr/how-our-offline-log-collection-works/">How Our Offline Log Collection Works</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
