Network Intrusion Detection Using Snort>

This article has been indexed from LinuxSecurity.com – Hybrid RSS

This document takes you through the basics of intrusion detection, the steps necessary to configure a host to run the snort network intrusion detection system, testing its operation, and alerting you to possible intrusion events.

Read the original article: Network Intrusion Detection Using Snort>