Email Alerts
-
How to configure Snort variables
Learn how to define Snort's configuration variables. Tip
-
Where to find Snort IDS rules
In this tip, JP Vossen points out the four best places to find Snort rules. Tip
-
Using IDS rules to test Snort
Here are several methods for testing Snort over the wire to ensure it's working properly in your environment. Tip
-
Blowfish
Blowfish is an encryption algorithm that can be used as a replacement for the DES or IDEA algorithms. Definition
-
Kermit
Kermit is a popular file transfer and management protocol and suite of communications software programs with advantages over existing Internet protocols such as File Transfer Protocol and Telnet. Definition
-
Open source: Time to pay up
If you think open-source products are free, it's time to wise up. Article
-
Nessus no longer free
Developers of the popular open-source tool are starting to charge commercial customers who bring nothing to the project's development. Article
-
Network architect: Hardening Linux networks with open source tools, part two
A network architect gets granular about using a few lesser known OS tools to build a secure infrastructure. Article
-
How secure are you?
A bias-free security testing methodology can help your organization move beyond general best-security practices, to discern exactly how many systems are actually protected. Article
-
Is Snort better than a proprietary IDS?
SearchSecurity's Snort and Network Security Expert JP Vossen answers the age-old questions, Is Snort better than a proprietary IDS? And is it difficult to manage or find support for? News
Security Management Strategies for the CIO