Snort has the following features:

* It detects threats, such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS clients, and alerts the user about them.
* It develops a new signature to find vulnerabilities.
* It records packets in their human-readable form from the IP address.
* It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connections.
* It is used to monitor a home DSL connection or a corporate Web site.

Explore More

Critical XSS vulnerability in YouthDreams.Net

Security Researcher $@T0R! reported another XSS vulnerability in http://www.youthdreams.net Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious attackers to inject

Computer Hacking

Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often

What are the countermeasures against sniffer attacks?

It is quite difficult to overcome sniffer attacks. However, the following steps can be taken as countermeasures against such attacks: * Use encrypted protocols for all communication. * Segment the