Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Hello. In Snort, how a digital signature is actually created
for the authentication purpose and thereby provides
intrusion detection as well as prevention. How the software
for IDS/IPS comes to know regarding the
threat/vulnerability using digital signature ? Whether any
specific language or programming is used or not.



Answer Posted / dj



NEED AN ANSWER

Is This Answer Correct ?    1 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What Is Encryption?

947


How can we use quantum properties in cryptography ?

1783


What is nonlinear cryptography?

6246


What is public-key cryptography ?

1828


How to I prevent other users from using Kryptel (Silver Key)?

1903


What is luc?

856


What is an encryption "key" and what is the importance of key length?

1885


What information can be obtained from encrypted file?

1976


What is are "proprietary" and "public" cryptographic algorithms?

1968


What are "stream" and "block" ciphers?

1961


Actual role of cryptography is data security .Explain with real world example?

1824


What is the rabin signature scheme?

866


What is private key cryptography and how we compare it with public key cryptography?

1775


What is exhaustive key search ?

2060


whats cryptanalysis?

2080