Using Snort v1.8 with SnortSnarf on a RedHat Linux System

To effectively implement system and network security, a multi pronged approach should be used. Proper security policies, firewalls, proxy servers, properly complex passwords and intrusion detection systems layered together help form one of the bedrock principles, defense in depth. The purpose of...
By
Richard Greene
July 25, 2001

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg