Subscribe: Intrusion Detection Systems
Added By: Feedage Forager Feedage Grade B rated
Language: English
capabilities  conf  ipv conf  ipv  linux  net ipv  net  ossec  proc sys  proc  security  start  sys net  sys  system  testing 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Intrusion Detection Systems

Intrusion Detection Systems

With today?s environment of evolving technologies and the intrusive attacks that accompany these, organizations find themselves in a position where they must generate the capability to monitor and respond to these attacks. Intrusion detection comes in ma

Published: Tue, 23 Jan 2018 20:05:10 +0000


Way off topic

Fri, 21 Jul 2006 20:06:06 GMT

This one goes way off topic from covering junk like IDS and security and takes you into the strange and bizarre world of looking for a new job. Whether you are in systems administration, networking or security or trying to get out of one and into the other, aside from internal promotion, there is usually only one way to get there and the road is challenging and loaded with many surprises and sometimes disappointments too. Fear not, successfully interviewing for a new position is all about your


Wed, 24 May 2006 16:53:53 GMT

Let's start off with a great opensource product titled OSSEC that can be found at This product works on unix based systems only and provides capabilities to check for rootkits, file and directory integrity, integrates with system logging and with snort FULL and FAST alert logging. What does all of this mean? Once installed, this application can be configured to check at configurable intervals for rootkits on the system. The OSSEC syscheck component monitors system files and direct

Linux antivirus eval

Tue, 23 May 2006 18:02:02 GMT

We have chosen Linux antivirus products from three major vendors for the purpose of testing the realtime component or live scanning. The three vendors and products chosen are: Mcafee - LinuxShield Kaspersky - Antivirus for Linux Workstation F-Secure - Linux client security The goal of this study was to ascertain the simplicity of installing the realtime module that enables live scanning capabilities in addition to researching the overall capabilities. Starting with Mcafee, building realtime

network laptop

Tue, 23 May 2006 16:23:23 GMT

Got a spare laptop? Ever had one of those laptops that are too slow to run any gui on but not so horrible that you can't wait to use it for extreme frisbee? Why not turn it into a networking system that can be used for configuring all of the routers and switches, for security scanning, pen testing, network monitoring and various other testing tools? Grab the net ISO of Debian and start grabbing the impressive realm of tools out there just within grasp of your fingertips. Don't get me wrong,

Layer 2.5 lockdown

Tue, 23 May 2006 15:12:12 GMT

With the use of a script and one tool, make your system virtually invisible on the network and fairly difficult to access. Let's start with a simple script that injects values into /proc: echo "0" > /proc/sys/net/ipv4/conf/all/accept_redirects echo "0" > /proc/sys/net/ipv4/conf/all/accept_source_route echo "0" > /proc/sys/net/ipv4/conf/all/send_redirects echo "1" > /proc/sys/net/ipv4/conf/all/rp_filter echo "1" > /proc/sys/net/ipv4/conf/all/log_martians echo "