Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Hello. In Snort, how a digital signature is actually created
for the authentication purpose and thereby provides
intrusion detection as well as prevention. How the software
for IDS/IPS comes to know regarding the
threat/vulnerability using digital signature ? Whether any
specific language or programming is used or not.



Answer Posted / dj



NEED AN ANSWER

Is This Answer Correct ?    1 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Do digital signatures help detect altered documents and transmission errors?

1013


What is multiple encryption?

909


What is secret-key cryptography ?

4014


What are knapsack cryptosystems?

885


What is probabilistic encryption?

907


Is there a limit on the file size or on the number of encrypted files?

1924


How can we use quantum properties in cryptography ?

1781


How do certifying authorities store their private keys ?

2457


What are the cfb and ofb modes?

878


How Encoding is different from Encryption?

910


What is the mceliece cryptosystem?

910


What is the Popular Symmetric-Key Encryption Method

895


What are the advantages of public-key cryptography compared with secret-key cryptography?

823


What information can be obtained from encrypted file?

1972


What is an algorithm?

2280