Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Hello. In Snort, how a digital signature is actually created
for the authentication purpose and thereby provides
intrusion detection as well as prevention. How the software
for IDS/IPS comes to know regarding the
threat/vulnerability using digital signature ? Whether any
specific language or programming is used or not.



Answer Posted / dj



NEED AN ANSWER

Is This Answer Correct ?    1 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the counter and pcbc modes?

876


What Is Encryption?

859


What is decryption?

866


What are the advantages of public-key cryptography compared with secret-key cryptography?

765


What is are "proprietary" and "public" cryptographic algorithms?

1902


Does encryption of connection strings in web.config file possible? How?

871


what is pretty good privacy?

1815


What information can be obtained from encrypted file?

1918


What is the mceliece cryptosystem?

846


What are knapsack cryptosystems?

831


whats cryptanalysis?

2021


What is the difference between Kryptel and Silver Key?

2007


How to change the encrypted file icon?

2474


What is probabilistic encryption?

849


What is the Popular Symmetric-Key Encryption Method

833