Solved

I want to setup a SNORT box on Ubuntu

Posted on 2012-12-30
3
647 Views
Last Modified: 2013-11-29
I need to be stepped through setting up a SNORT box on Ubuntu.  I'm not familiar with either
and I did try and just got confused.  I got Ubuntu installed but when I was going through the SNORT instructions nothing seemed to work...I couldn't get the signatures load and stuff...

I need to slowly go through it step by step and ask whatever questions I have at each step.

I would prefer to give all the points to the one who is willing to walk me through this.
0
Comment
Question by:rand1964
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 9

Accepted Solution

by:
abolinhas earned 250 total points
ID: 38731431
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 250 total points
ID: 38742837
0
 

Author Closing Comment

by:rand1964
ID: 38742842
I'm actually going with Security Onion
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question