Examining a Public Exploit, Part 1 | |
From: | Joe Klemmer |
Date: | Sat, 14 Aug 2004 10:23:36 -0400 |
Examining a Public Exploit, Part 1 by Don Parker last updated August 11, 2004 To many people, the world of computer security and intrusion detection can often be confusing to understand. As an instructor, many of the people who ask me about intrusion detection and packet analysis often ask the same questions, such as the following: What tools do you use? Can you practice and learn this at home? What kind of knowledge does one need to have? These and other questions figure predominantly. In this article series these questions will be answered and shown to the reader for evaluation in a lab environment. http://www.securityfocus.com/infocus/1795