References
21
  Enable TCP/IP on the network interface that you want to use in the stealth
mode. Disable everything other than TCP/IP.
  Enable DHCP client.
  Disable DHCP service.
This will cause no address to be assigned to the interface while the interface is still
bound to TCP/IP networking.
1.8 References
1. Intrusion detection FAQ at http://www.sans.org/newlook/resources/IDFAQ/
ID_FAQ.htm
2. Honey Pot Project at http://project.honeynet.org/
3. Snort FAQ at http://www.snort.org/docs/faq.html
4. Honeyd Honey Pot at http://www.citi.umich.edu/u/provos/honeyd/
5. Winpcap at http://winpcap.polito.it/
6. Cisco systems at http://www.cisco.com
7. Checkpoint web site at http://www.checkpoint.com
8. Netscreen at http://www.netscreen.com
9. Netfilter at http://www.netfilter.org
10. Snort at http://www.snort.org
11. The Nmap tool at http://www.nmap.org
12. Nessus at http://www.nessus.org
13. MySQL database at http://www.mysql.org
14. ACID at http://www.cert.org/kb/acid
15. Apache web server at http://www.apache.org






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

toronto web hosting

 

Our partners: PHP: Hypertext Preprocessor Cheap Web Hosting JSP Web Hosting Ontario Web Hosting  Jsp Web Hosting

Cheapest Web Hosting Java Hosting Cheapest Hosting

Visionwebhosting.net Business web hosting division of Vision Web Hosting Inc.. All rights reserved