Analyzing firewall logs is key to understanding the threats your servers face. Knowing what the bad guys are looking for is the first step in assessing how vulnerable your servers are. Both open source and commercial firewalls make log information available to firewall administrator. But taking risk assessment a step further, what if there were a way to apply the principles that make open source software successful to firewall log analysis? A way to help yourself and others at the same time? The DShield project seeks to do just that.

"DShield bills itself as a distributed intrusion detection system. It works by collecting statistics from firewalls all over the world......

****************                   *****************************

Kiggundu Mukasa                # Computer Network Consultancy###

KYM-NET LTD.                   # Intranets & Internet Solutions#

Plot 80 Kanjokya Street

P.O. Box 24284 Kampala, Uganda             

Tel:     +256 77 972255

         +256 71 221141

Fax:     +256 31 262122

*****************************************************************


Attachment: PGP.sig
Description: This is a digitally signed message part

_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

Reply via email to