Pick a Free OS

User login


Intrusion Detection System Part 3: Snort

Here ends our look at Snort. Following up will be another article that will help you ascertain the dangers that your system logs are prone to and the security measures you can put into place to prevent tampering of your precious system logs in case of a security breach.

Don't let life discourage you;

Everyone who got where he is

had to begin where he was.

-Richard L Evans