View Full Version

Saving Our Bacon: Snort Security Holes and Strategies for Safe Network Monitoring