[Full-Disclosure] IDS Signatures

2005-02-22 Thread preeth k
Hi, I am designing a Network Intrusion Detection System in Linux. I want to create a database of intrusion signatures using MySQL database. Can anyone please give an idea about what all fields I have to include, how to store packet payload, which pattern matching algorithm to use, etc. (Will

[Full-Disclosure] Mirroring procfs.

2005-01-25 Thread preeth k
Sir, I work on Redhat Linux and we want to know if there is any method to mirror the '/proc' filesystem on one machine-A to another machine-B so as to monitor all the events occuring in A using machine-B. Preeth. ___ Full-Disclosure - We believe in