slackbuilds/network/snort
David Spencer 3e68e1cb60
network/snort: Support non-ethernet decoders.
Thanks to Panagiotis Nikolaou.

Signed-off-by: David Spencer <idlemoor@slackbuilds.org>
2017-02-04 06:59:25 +07:00
..
README network/snort: Support non-ethernet decoders. 2017-02-04 06:59:25 +07:00
README.SLACKWARE network/snort: Support non-ethernet decoders. 2017-02-04 06:59:25 +07:00
doinst.sh network/snort: Updated for version 2.9.7.2. 2015-04-05 08:38:20 +07:00
rc.snort network/snort: Updated for version 2.9.7.0. 2015-02-28 11:38:41 +07:00
slack-desc network/snort: Fix slack-desc. 2016-11-14 16:47:23 +07:00
snort.SlackBuild network/snort: Support non-ethernet decoders. 2017-02-04 06:59:25 +07:00
snort.info network/snort: Updated for version 2.9.9.0. 2016-12-17 06:55:50 +07:00

README

Snort is an open source network intrusion detection and prevention system.
It is capable of performing real-time traffic analysis, alerting, blocking
and packet logging on IP networks. It utilizes a combination of protocol
analysis and pattern matching in order to detect a anomalies, misuse and
attacks.

Snort uses a flexible rules language to describe activity that can be
considered malicious or anomalous as well as an analysis engine that
incorporates a modular plugin architecture. Snort is capable of detecting
and responding in real-time, sending alerts, performing session sniping,
logging packets, or dropping sessions/packets when deployed in-line.

Snort has three primary functional modes.  It can be used as a packet
sniffer like tcpdump(1), a packet logger (useful for network traffic
debugging, etc), or as a full blown network intrusion detection and
prevention system.

For more information about running Snort on Slackware, please see
README.SLACKWARE.