IDS = Intrusion Detection System Are systems used to detect network and host based attack signatures. They can be installed on a host system or as devices on the network, in the DMZ, a screened sub-net, or Intranet. There are numerous available commercially and a few freeware out there as well. ISS RealSecure Cisco NetRanger Network Flight Recorder NFR Snort freeware Shadow freeware BlackIce Defender Regards, Ron ----- Original Message ----- From: "Anup Manjrekar" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Thursday, February 08, 2001 6:05 AM Subject: IDS? > > that is IDS and how does it work? > thanks and regards, > > .anup > > - > [To unsubscribe, send mail to [EMAIL PROTECTED] with > "unsubscribe firewalls" in the body of the message.] > - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]
