Back to Results
First PageMeta Content
Computer security / Cyberwarfare / Iptables / Netfilter / Firewall / Snort / Denial-of-service attack / System software / Software / Computer network security


fire_03.book Page 173 Monday, August 27, 2007 3:54 PM 10 DEPLOYING FWSNORT With the theoretical discussion in Chapter 9 on the emulation of Snort rule options
Add to Reading List

Document Date: 2012-02-08 15:24:21


Open Document

File Size: 518,55 KB

Share Result on Facebook

Company

FORWARD / INPUT / ORACLE / Linux Firewalls No Starch Press / OUTPUT / /

Event

Man-Made Disaster / /

Facility

Configurable port / /

IndustryTerm

real network communications / security applications / respective fwsnort chain / web-cgi.rules / web-attacks.rules / external network / web-attacks / exploit.rules web-cgi.rules web-client.rules web-coldfusion.rules web-frontpage.rules web-iis.rules web-misc.rules / hosts/networks / dedicated firewall device / web-client.rules / /

OperatingSystem

Linux / /

Person

Michael Rash / /

Position

FWSNORT_FORWARD / /dev/null FWSNORT_FORWARD / capable interpreter / /

ProgrammingLanguage

Perl / Bourne shell / php / /

Technology

SNMP / php / dns / Linux system / firewall / Linux / HTTP / firewall system / Perl / /

URL

http /

SocialTag