* Part 1: Introduction to Snort intrusion detection and prevention
* Part 2: Hardware and network setup requirements
* Part 3: Installation prerequisites
* Part 4: Compiling and configuration with MySQL
* Part 5: Configuring Snort and setting up rules
* Part 6: Editing the snort.conf file
http://searchsecurity.techtarget.com.au –
- Login to post comments