Hello. In Snort, how a digital signature is actually created
for the authentication purpose and thereby provides
intrusion detection as well as prevention. How the software
for IDS/IPS comes to know regarding the
threat/vulnerability using digital signature ? Whether any
specific language or programming is used or not.



Answer Posted / dj



NEED AN ANSWER

Is This Answer Correct ?    1 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Blowfish uses the longest key. Does this mean it is the strongest cipher?

1973


what is pretty good privacy?

1570


What is decryption?

578


What is public key encryption?

1545


What is exhaustive key search ?

1769






What is multiple encryption?

579


What Is Encryption?

578


How to change the encrypted file icon?

2056


Does encryption of connection strings in web.config file possible? How?

625


What is nonlinear cryptography?

5930


How to change the location of the Kryptel (Silver Key) program group?

1585


What is a zed encoder? How does it work?

2282


What are the counter and pcbc modes?

577


What are "stream" and "block" ciphers?

1593


How do certifying authorities store their private keys ?

2065