亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? faq

?? 入侵檢測系統(tǒng).linux下與MySql連用的例子
??
?? 第 1 頁 / 共 5 頁
字號:
2.4 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: Libpcap complains about permissions problems, what's going on?A: You are either not running snort as root or your kernel   is not configured correctly.                                                                   2.5 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: Why does snort complain about /var/log/snort?A: It requires this directory to log alerts to it.   Use: mkdir /var/log/snort2.6 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q:  I've got RedHat and ....A:  Check your version of libpcap.  :) If it's not >= 0.5, then you should    update.   2.7 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: Where do I get the latest version of libpcap?A: http://www.tcpdump.org/2.8 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: Why does building snort complain about missing references?A: You must make libpcap with the --install-incl option or install the    libpcap-devel rpm.2.9 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: Why does building snort fail with errors about yylex and lex_init?A: You need the lex and yacc tools or their gnu equivalents   flex and bison installed.2.10 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q:  I Want to build a snort box.  Will this <Insert List> handle <this much>    traffic?A:  That depends.  ;-)  Lower the number of rules is a standard performance    increase.  Disable rules that you don't need or care about.  Etc...  There    have been many discussions on 'tweaking performance' with lots of 'I handle    XX mb with a ___ machine setup.' being said.  Look at some of the     discussions on snort-users2.11 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: What are CIDR netmasks?A: Excerpted from url: http://public.pacbell.net/dedicated/cidr.htmlCIDR is a new addressing scheme for the Internet which allows for more iefficient allocation of IP addresses than the old Class A, B, and C address scheme.CIDR Block Prefix # Equivalent Class C # of Host Addresses/27 1/8th of a Class C 32 hosts/26 1/4th of a Class C 64 hosts/25 1/2 of a Class C 128 hosts/24 1 Class C 256 hosts/23 2 Class C 512 hosts/22 4 Class C 1,024 hosts/21 8 Class C 2,048 hosts/20 16 Class C 4,096 hosts/19 32 Class C 8,192 hosts/18 64 Class C 16,384 hosts/17 128 Class C 32,768 hosts/16 256 Class C 65,536 hosts (= 1 Class B)/15 512 Class C 131,072 hosts/14 1,024 Class C 262,144 hosts/13 2,048 Class C 524,288 hostsFor more detailed technical information on CIDR, go to http://www.rfc-editor.org/rfcsearch.html and type in the number of the CIDR RFC you are interested in:RFC 1517: Applicability Statement for the Implementation of CIDRRFC 1518: An Architecture for IP Address Allocation with CIDRRFC 1519: CIDR: An Address Assignment and Aggregation StrategyRFC 1520: Exchanging Routing Information Across Provider Boundaries in the           CIDR Environment2.12 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: What is the use of the "-r" switch to read tcpdump files? A: Used in conjunction with a snort rules file, the tcpdump data can be   analyzed for hostile content, port scans, or anything else Snort can be used   to detect.  Snort can also just simply display the packets in their decoded   format, which many people find is easier to read than native tcpdump   output. --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--***************************************Section 3: CONFIGURING SNORT***************************************3.1 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q:  How do I setup snort on a 'stealth' interface?A:  Bring up the interface without an IP address on it. See FAQ 3.2...    http://www.geocrawler.com/archives/3/4890/2000/9/0/4399696/A:  Use an ethernet tap, or build your own 'receive-only' ethernet cable.    http://personal.ie.cuhk.edu.hk/~msng0/sniffing_cable/index.htmA:  Anyway, here is the cable I use:     LAN Sniffer     1 -----\ /-- 1     2 ---\ | \-- 2     3 ---+-*------- 3     4 - | - 4     5 - | - 5     6 ---*-------- 6     7 - - 7     8 - - 8         Basically, 1 and 2 on the sniffer side are connected, 3 and 6     straight through to the LAN. 1 and 2 on the LAN side connect to 3 and     6 respectively. This fakes a link on both ends but only allows     traffic from the LAN to the sniffer. It also causes the 'incoming'     traffic to be sent back to the LAN, so this cable only works well on     a hub. You can use it on a switch but you will get ...err...     interesting results. Since the switch receives the packets back in on     the port it sent them out, the MAC table gets confused and after a     short while devices start to drop off the switch. Works like a charm     on a hub though. 3.2 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: How do I run snort on an interface with no IP address?A: ifconfig ethN up3.3 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: My network spans multiple subnets.  How do I define HOME_NET?A: Snort 1.7 supports IP lists.  You can assign a number of addresses to   a single variable.  For example:     var HOME_NET [10.1.1.0/24,192.168.1.0/24]   NOTE: Not all preprocessors support IP lists at this time.  Unless   otherwise stated, assume that any preprocessor using an IP list variable   will use the first value as the HOME_NET.  The portscan preprocessor   is an example.  To catch all detectable portscans, pass 0.0.0.0/0 in   as the first parameter.   preprocessor portscan: 0.0.0.0/0 5 3 portscan.log   Use the portscan-ignorhosts preprocessor to fine tune and ignore   traffic from noisy, trusted machines.3.4 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: How can I run snort on multiple interfaces simultaneously.A: If you aren't running snort on linux 2.1.x/2.2.x kernel (with LPF available)    the only way is to run multiple instances of snort, one instance per    interface. However for  linux 2.1.x/2.2.x and higher you can use libpcap    library with S. Krahmer's patch which allows you to specify 'any' as     interface name. In this case snort will be able to process traffic     coming to all interfaces.3.5 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: IP address is assigned dynamically to my interface, can I use snort with it?A:  Yes.  With snort 1.7 and later, <interface>_ADDRESS variable is available.    The value of this variable will be always set to IP address/Netmask of the    interface which you run snort at. if interface goes down and up again (and    an IP address is reassigned) you will have to restart snort. For earlier    versions of snort numerous scripts to achieve the same result are    available.3.6 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: I have one network card and two aliases, how can I force snort to "listen"   on both addresses ? A: If you're using at least version 1.7, you can specify an IP list like   this:	var HOME_NET [192.168.<your-IP>/24,<Internet address>/32]   If you're using something older (version 1.6.3-patch2 or whatever) you can   re-specify the HOME_NET variable multiple times like this (for example):	var HOME_NET 10.1.1.0/24	include scan-lib	etc.	var HOME_NET 192.168.1.0/24	include scan-lib	etc.3.7 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: How do I ignore traffic coming from a particular host or hosts?A: Write pass rules and add the host(s) to the portscan-ignorehosts list.   Call Snort with the -o option to activate the pass rules.   See http://www.snort.org/writing_snort_rules.htm for more information.3.8 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: How do I get Snort to log the packet payload as well as the header? A: Use the "-d" command line option.  3.9 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: Why are there no subdirectories under /var/log/snort for IP addresses?A: It depends on how your snort configuration logs. If it logs in binary   format, you'll have to process the binary log in order to get cleartext3.10 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: How do you get snort to ignore some traffic?A1: Specify bpf filters on the command line the tcpdump man page    has a description of bpf filters.A2: Use a pass ruleA3: The portscan preprocessor has it's own special exclusion list    with the portscan-ignorehosts.rules file directive3.11 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: Why does the portscan plugin log "stealth" packets even though the   host is in the portscan-ignorehosts list?A: These types of tcp packets are inherently suspicious, no matter where   they are coming from.  The portscan detector was built with the assumption   that "stealth" packets should be reported, even from hosts which are not   monitored for portscanning.  An option to ignore "stealth" packets may be   added in the future.3.12 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: Which takes precedence, commandline or rule file ?A: The command line always gets precedence over the rules file.  If people   want to try stuff out quickly without having to manually edit the rules   file, they should be able to override many things from the command   line.  3.13 --faq-- --snort-- --faq-- --snort-- --faq-- --snort-- --faq--Q: How does rule ordering work?A: Marty has answered this many times on the snort-users mailing list.  Here is   an excerpt from a post on Thu, 22 Feb 2001 00:31:53 -0500, titled "Re:    [Snort-users] order of evaluation of rules"Currently, the data structures that store Snort rule data are theRuleTreeNodes (RTN) and the OptTreeNodes (OTN).  These data structs arestored in a two dimensinal linked list structure with the RTNs formingthe top row of the "Array" and the OTNs forming the columns under theRTNs.  Here's an ASCII illustration from the infamous "lisapaper":  RTN                   RTN                    RTN             --------------        --------------         ----- | Chain Header |      | Chain Header |      | Chai |              |      |              |      | | Src IP       |      | Src IP       |      | Src | Dst IP       |----->| Dst IP       |----->| Dst   ..... | Src Port     |      | Src Port     |      | Src | Dst Port     |      | Dst Port     |      | Dst |              |      |              |      |  --------------        --------------         -----         |                     |         |                     |         |                     |  OTN   \|/            OTN    \|/  -------V------       --------V------- | Chain Option  |    | Chain Option   | |               |    |        :       | | Content       |             : | TCP Flags     |             : | ICMP Data     | | Payload Size  | | etc.          | |               |  ---------------          |         |         |   OTN  \|/  -------V------ | Chain Option | |              | | Content      | | TCP Flags    | | ICMP data    | | Payload Size | | etc.         | |              |  --------------          |         | Rules with similar rule headers (i.e. all the CGI rules, the old stealthport scan detection rules, most of the rules that focus on any singleservice, etc) are grouped under a single RTN for the sake of efficiencyand the applicable OTNs are hung below them.  For instance, if you havethree rules like this:alert tcp any any -> $HOME 80 (content: "foo"; msg: "foo";)alert tcp any any -> $HOME 80 (content: "bar"; msg: "bar";)alert tcp any any -> $HOME 80 (content: "baz"; msg: "baz";)They all get grouped under the same RTN and the OTNs are "hung" beneaththem like this:  RTN --------------------|  SIP: any          ||  SP: any           ||  DIP: $HOME        ||  DP: 80            | --------------------           |          |  OTN    \|/   ---------v----------| content: foo       |

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美军同video69gay| 亚洲综合免费观看高清在线观看| 中文字幕av免费专区久久| 亚洲精品国产一区二区三区四区在线 | 成人在线视频首页| 欧美日韩亚洲综合一区二区三区| 国产欧美精品一区二区色综合朱莉| 亚洲一级二级三级在线免费观看| 成人综合婷婷国产精品久久蜜臀 | 欧美日韩一区小说| 国产精品国产精品国产专区不蜜| 国产综合色在线| 欧美巨大另类极品videosbest| 中文字幕一区免费在线观看| 精品一二线国产| 欧美一区二区三区免费| 亚洲综合激情网| 色欧美乱欧美15图片| 欧美激情中文字幕| 国产成人8x视频一区二区| ww亚洲ww在线观看国产| 久久激情综合网| 日韩你懂的在线播放| 婷婷久久综合九色综合绿巨人| 91传媒视频在线播放| 亚洲视频一区二区在线| 成人av网在线| 国产精品视频你懂的| av午夜一区麻豆| 樱桃视频在线观看一区| 99精品欧美一区二区三区综合在线| 欧美激情在线观看视频免费| 成人国产精品免费网站| 亚洲国产成人午夜在线一区| av中文一区二区三区| 亚洲欧美国产三级| 一本久久a久久免费精品不卡| 一区二区三区四区在线| 精品视频在线视频| 人禽交欧美网站| 欧美xingq一区二区| 国产米奇在线777精品观看| 国产色综合久久| av网站免费线看精品| 一区二区三区色| 欧美日本不卡视频| 激情六月婷婷综合| 国产精品色婷婷| 日本韩国一区二区三区视频| 亚洲成av人片在线观看| 日韩欧美一级在线播放| 国产成人av福利| 亚洲一区二区三区在线| 日韩精品专区在线| 不卡一二三区首页| 午夜电影网一区| 久久久久国色av免费看影院| 色一情一伦一子一伦一区| 亚洲成精国产精品女| 久久网站最新地址| 一本大道av一区二区在线播放| 日韩综合小视频| 中文字幕国产一区| 欧美三级在线视频| 国产91高潮流白浆在线麻豆| 亚洲综合偷拍欧美一区色| 精品蜜桃在线看| 一本大道久久a久久综合| 日韩高清欧美激情| 国产精品护士白丝一区av| 欧美精三区欧美精三区| 国产成人亚洲精品狼色在线| 亚洲成人福利片| 国产嫩草影院久久久久| 欧美一区二区高清| 色婷婷香蕉在线一区二区| 久久精品国产在热久久| 亚洲精品成人少妇| 国产午夜精品一区二区三区四区| 欧美日韩精品系列| 成人国产精品视频| 国模娜娜一区二区三区| 视频一区欧美日韩| 一区二区三区精品| 国产欧美日韩中文久久| 欧美一区二区久久| 欧美综合一区二区三区| 成人av在线一区二区三区| 久久97超碰国产精品超碰| 亚洲一二三四区| 综合激情成人伊人| 国产色产综合产在线视频| 日韩三级高清在线| 欧美日韩综合一区| 色8久久人人97超碰香蕉987| 成人深夜在线观看| 国产一区二区三区免费播放| 麻豆精品蜜桃视频网站| 午夜久久久久久| 午夜精品一区二区三区电影天堂| 亚洲欧美日韩在线不卡| 国产精品久久免费看| 久久久国产一区二区三区四区小说 | 日韩欧美二区三区| 欧美电影一区二区| 欧美日韩免费一区二区三区 | 成人性视频网站| 国产精品一区二区你懂的| 国产一区二区三区视频在线播放| 久久精品久久综合| 免费日韩伦理电影| 久久99久久99精品免视看婷婷| 青青国产91久久久久久| 麻豆免费精品视频| 国产一区二区三区不卡在线观看| 久久99精品国产.久久久久久| 久久91精品国产91久久小草| 激情小说亚洲一区| 国产成人免费视频网站高清观看视频| 激情综合一区二区三区| 国产精品一区二区不卡| www.欧美色图| 日本黄色一区二区| 91精品欧美久久久久久动漫| 欧美一级二级三级乱码| 欧美不卡一区二区三区| 久久精品亚洲一区二区三区浴池| 久久久av毛片精品| 亚洲国产精品成人综合 | 国产精品天美传媒| 亚洲免费观看视频| 婷婷丁香激情综合| 激情六月婷婷久久| 91网页版在线| 7777精品伊人久久久大香线蕉的 | 午夜精品久久久| 久久se精品一区精品二区| 丰满亚洲少妇av| 在线国产电影不卡| 日韩精品一区二区三区视频 | 日本视频一区二区三区| 国产在线观看一区二区| 91免费在线视频观看| 69久久99精品久久久久婷婷| 久久网站热最新地址| 亚洲精品乱码久久久久久 | 91小视频免费看| 欧美另类一区二区三区| 国产日产欧美一区| 亚洲电影一区二区三区| 国产在线精品一区二区夜色| 91在线看国产| 精品对白一区国产伦| 亚洲女女做受ⅹxx高潮| 青青草97国产精品免费观看无弹窗版| 福利电影一区二区三区| 337p亚洲精品色噜噜狠狠| 国产精品美女久久久久久久久 | 欧美一区二区免费观在线| 亚洲欧洲日韩一区二区三区| 人人精品人人爱| 色呦呦国产精品| 日本一区二区三区国色天香| 天天做天天摸天天爽国产一区 | 99久久精品国产毛片| 日韩视频在线你懂得| 亚洲黄色小视频| 国产黄色成人av| 欧美一区二区精美| 亚洲国产精品久久人人爱蜜臀| 成人一区二区三区在线观看| 日韩欧美国产综合在线一区二区三区| 亚洲久草在线视频| 成人午夜大片免费观看| 日韩欧美一区二区不卡| 视频一区免费在线观看| 在线观看三级视频欧美| 中文字幕精品一区二区精品绿巨人| 毛片不卡一区二区| 欧美日韩国产另类不卡| 一区二区三区高清| 91一区二区在线| 国产精品萝li| 国产69精品久久久久777| 日韩精品中文字幕一区二区三区 | 精品捆绑美女sm三区| 日韩影院精彩在线| 91福利资源站| 一区二区三区国产精华| 91丨九色丨蝌蚪富婆spa| 亚洲欧洲精品一区二区精品久久久| 国产精品综合二区| 久久青草欧美一区二区三区| 国产一区二区三区香蕉| 精品理论电影在线观看| 国内一区二区在线| 久久精品免费在线观看| 国产suv精品一区二区三区| 国产喂奶挤奶一区二区三区| 国产成人高清在线|