This article has been indexed from LinuxSecurity.com – Hybrid RSS
This document takes you through the basics of intrusion detection, the steps necessary to configure a host to run the snort network intrusion detection system, testing its operation, and alerting you to possible intrusion events.
Read the original article: Network Intrusion Detection Using Snort>