We have a 300-workstation network with a Windows 2000 server, two domain controllers, a SQL 2000 database server, Linux Web server and ISA firewall. We’ve been asked to segment the database server ...
Lance Spitzner of the Honeynet Project (www.honeynet.org) suggests a trick that's useful for honey (decoy) nets and maybe even for production DMZs: stealth logging. This trick allows a host connected ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results