A discussion of different monitoring techniques | Dark Hacker News