References
21
Enable TCP/IP on the network interface that you want to use in the stealth
mode. Disable everything other than TCP/IP.
Enable DHCP client.
Disable DHCP service.
This will cause no address to be assigned to the interface while the interface is still
bound to TCP/IP networking.
1.8 References
1. Intrusion detection FAQ at http://www.sans.org/newlook/resources/IDFAQ/
ID_FAQ.htm
2. Honey Pot Project at http://project.honeynet.org/
3. Snort FAQ at http://www.snort.org/docs/faq.html
4. Honeyd Honey Pot at http://www.citi.umich.edu/u/provos/honeyd/
5. Winpcap at http://winpcap.polito.it/
6. Cisco systems at http://www.cisco.com
7. Checkpoint web site at http://www.checkpoint.com
8. Netscreen at http://www.netscreen.com
9. Netfilter at http://www.netfilter.org
10. Snort at http://www.snort.org
11. The Nmap tool at http://www.nmap.org
12. Nessus at http://www.nessus.org
13. MySQL database at http://www.mysql.org
14. ACID at http://www.cert.org/kb/acid
15. Apache web server at http://www.apache.org
footer
Our partners:
PHP: Hypertext Preprocessor Cheap Web Hosting
JSP Web Hosting
Ontario Web Hosting
Jsp Web Hosting
Cheapest Web Hosting
Java Hosting
Cheapest Hosting
Visionwebhosting.net Business web hosting division of Vision Web Hosting Inc.. All rights reserved