Email Alerts
-
Where to find Snort IDS rules
In this tip, JP Vossen points out the four best places to find Snort rules. Tip
-
Using IDS rules to test Snort
Here are several methods for testing Snort over the wire to ensure it's working properly in your environment. Tip
-
Modifying and writing custom Snort IDS rules
Learn more about altering Snort rules. Tip
-
Vulnerability scanning with Nessus
Nessus is a free vulnerability scanning tool that works differently than other scanners. Tip
-
POF fingerprint scanning tools mitigate OS fingerprinting vulnerabilities
Nmap's silent parnter, POF is an OS fingerprinting tool for the good guys. Tip
-
Secure file-sharing across networks -- and it's free
In this edition of Strom's Security Tool Shed, David Strom evaluates Groove Networks 1.0. Tip
Security Management Strategies for the CIO