Intrusion Detection System Part 3: Snort
Email:
Here ends our look at Snort. Following up will be another article that will help you ascertain the dangers that your system logs are prone to and the security measures you can put into place to prevent tampering of your precious system logs in case of a security breach.
Don't let life discourage you;
Everyone who got where he is
had to begin where he was.
-Richard L Evans
- « first
- ‹ previous
- of 5