IDS = Intrusion Detection System

Are systems used to detect network and host based attack signatures. They
can be installed on a host system or as devices on the network, in the DMZ,
a screened sub-net, or Intranet.

There are numerous available commercially and a few freeware out there as
well.

ISS RealSecure
Cisco NetRanger
Network Flight Recorder NFR
Snort freeware
Shadow freeware
BlackIce Defender

Regards,
Ron
----- Original Message -----
From: "Anup Manjrekar" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, February 08, 2001 6:05 AM
Subject: IDS?


>
> that is IDS and how does it work?
> thanks and regards,
>
> .anup
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
>

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to