Solved

Intrusion Detection - Personal (collection)

Posted on 2001-07-13
13
170 Views
Last Modified: 2013-11-16
Personal experience, PLZ,

What have you done (installed, tried), observed (seen, witnessed), or wished for? For your own personal gear.

For detecting intrusions, incidents, or defining permissable activity (ex: UDP ports, IM, remote control, remote access).

Let's make ourSelves a collection on EE.

Note: this is for situation Before any specific event, as you plan defense (or not).
0
Comment
Question by:SunBow
13 Comments
 
LVL 12

Expert Comment

by:Housenet
ID: 6284554
SunBow as usual I have absolutly no clue what you are saying. Can you reiterate in decipherable grammatically correct English ? http://www.edufind.com/english/grammar/
0
 
LVL 24

Author Comment

by:SunBow
ID: 6286590
oh, you are: "currently employed by Satan, who commands you .."

<while there yet remains a beat of a different drummer>

> "Can you reiterate in decipherable grammatically
correct English ?"

No internal need to be quotable for publication elsewhere.
0
 
LVL 24

Author Comment

by:SunBow
ID: 6286656
(fwiw: quote included Housenet EE profile)
0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 
LVL 12

Expert Comment

by:Housenet
ID: 6287082
SunBow you crack me up :).. Where do you live ?
0
 
LVL 1

Expert Comment

by:auto65888
ID: 6294633
here is a good collection of IDS tools... http://www.networkintrusion.co.uk/ids.htm

is that what your asking for?
0
 
LVL 4

Expert Comment

by:andydis
ID: 6298920
blackice :- crap
zonealrm:- even worse

script kiddies get hold of stuff and can get in easily....

the best protected system is a open system
0
 

Expert Comment

by:joeymia
ID: 6303709
I'm using Snort which i obtained at www.snort.org. This can run on either unix or nt. The setup on on linux is pretty straight forward. He here is a document detailing what needs to be done to get it working correctly on Windows NT/2000 http://www.snort.org/lisapaper.txt .
0
 
LVL 1

Accepted Solution

by:
batkung earned 20 total points
ID: 6344741
why is zonealarm crap?

if the majority of the antivirus community (including several highly respected AV authors) recommend it, why would this be considered as a bad option?

looks to me like this comment was posted by a norton user!

I would recommend zonealarm, and tiny personal firewall for personal proximity security.

for IDS, nmap, snort, saint, satan (although it's a bit outdated now)

(oh and sunbow, I agree, housenet is a bit of an arrogant tosser)
0
 
LVL 28

Expert Comment

by:vinnyd79
ID: 6548054
Sygate has a free personal firewall

http://www.sygate.com/free/spf_download.htm

0
 
LVL 24

Author Comment

by:SunBow
ID: 6668553
>  Where do you live ?

...other side of your closet door...
0
 
LVL 1

Expert Comment

by:Moondancer
ID: 6741746
What is your plan with this question?  Locked and open.
Moondancer
Community Support Moderator @ Experts Exchange
0
 
LVL 24

Author Comment

by:SunBow
ID: 6742147
Generally, this gets poor grade as easy question, but usually more points are offered for so-called 'easy'.

I am (was) more interested in your own experience, so have to reject joeymia for proposing that I go read someone else's text. I do enough of that already. But I was very happy about the Snort reference, for it does not seem to get the attention that it might well deserve, so I encourage you to keep reminding us on alternatives, especially the ones making the leap from unix to windows. Perhaps we can actually get some real cross-platform someday.
0
 
LVL 24

Author Comment

by:SunBow
ID: 6742181
This is the best one of the bunch, from batkung, yet the whole thread is anemic, for my purpose, but there was my own inattentiveness. I'll PAQ batkung's mostly because of the combined contributions here, including the ones at the following link, which are more elaborate, and applicable so doubling the points (from 10 to 20) to include:

http://www.experts-exchange.com/jsp/qShow.jsp?ta=security&qid=20151508
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Forwarding web requests to different web servers 15 119
Botnet detection help me please 21 115
mysql disables rename 4 71
Opinions of Sophos Intercept X and Endpoint Security 2 26
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question