Snort is a Network Intrusion Detection System (NIDS), which can view and analyze packets on a network to determine whether or not a system is being attacked by remote. Most Linux distributions come with Snort, so it’s simply a matter of installing Snort via urpmi, apt-get, or yum.
Read more »Detect intruders on your network with Snort
Category: End User Tags:
- Login to post comments
Creating Snort Rules with EnGarde
There are already tons of written Snort rules, but there just might be a time where you need to write one yourself. You can think of writing Snort rules as writing a program. They can include variables, keywords and functions.
Read more »Category: High End Tags:
- Login to post comments
Snort on Red Hat Enterprise Linux 5 - 6 part series
* Part 1: Introduction to Snort intrusion detection and prevention
* Part 2: Hardware and network setup requirements
* Part 3: Installation prerequisites
* Part 4: Compiling and configuration with MySQL
* Part 5: Configuring Snort and setting up rules
* Part 6: Editing the snort.conf file
- Login to post comments
Open Source Security, Part 2: 10 Great Apps
Having many more eyes watching the code and a community of developers backing up users, open source security applications provide a wide range of options and made-to-order uses. Here's a list of 10 serious open source security applications, gathered via the word-of-mouth of the CSOs who use them.
Read more »Category: End User Tags:
- Login to post comments
Intrusion detection with Snort on Red Hat Enterprise Linux 5
We're going to demonstrate how to quickly install and run the open source IDS sensor Snort on Red Hat Enterprise Linux 5 (RHEL 5). The instructions below will also generally work for RHEL 4, CentOS 4 and 5, as well as Fedora Core 5 and 6.
Read more »Category: High End Tags:
- Login to post comments