IDSES (INTRUSION DETECTION systems) are probably one of the hottest segments of the overall security market these days. For many companies, the best tool is an open-source offering from Sourcfire ...
Having trouble finding malicious activity during Snort scans? Your Snort implementation may need a tune up. Joel Esler tells you how to do it using host attribute tables. The question I receive most ...
Legend has it that the Aztecs and the Mayans used cacao to elevate participants of rituals to a state of ecstasy. Fast forward to today: The latest fad among youth today is snorting chocolate; more ...
Snort can be buffer overflowed. About once a year, Snort gets a buffer overflow vulnerability. Any piece of additional software in a defense strategy has to be carefully considered (e.g. Snort, ...