To learn more about keeping our network from being compromised, we subscribed to a security mailing list. We have read about the Snort intrusion-detection system. Can we run it on a Windows system and ...
Having trouble finding malicious activity during Snort scans? Your Snort implementation may need a tune up. Joel Esler tells you how to do it using host attribute tables. The question I receive most ...
False positives and data management are two of the most frustrating aspects of using an intrusion-detection system, but a new version of Snort, the freely available IDS that we use, has greatly ...