How do the different types of intrusion prevention system (IPS) work? Inline systems sit on the network like layer-two bridges, passing traffic along as they receive it. Host-based systems sit on the server, watching the traffic that it sends and receives. Both check packets for any suspicious activity, often using the most …
For a free GPL solution see the Snort inline fork - Suricata
Snort is going to be over taken by Suricata shortly - snort-inline has dies as a project.. (only the inline version is an IPS rather than IDS)
Suricata is 'more free' and as a result has funding by the USA navy (the creators of Tor) and the Dept of homeland security...
Spot the obvious omission?
Errr... where's Snort in the list???
- Hi-torque tank engines: EXTREME car hacking with The Register
- Product round-up Ten excellent FREE PC apps to brighten your Windows
- Review What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
- Product round-up Trousers down for six of the best affordable Androids
- Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...