在iis 网络伺候器上运行snort part i(外文文献翻译).doc
约10页DOC格式手机打开展开
在iis 网络伺候器上运行snort part i(外文文献翻译),在iis 网络伺候器上运行snort part i(外文文献翻译)introduction not too long ago when talking about network security tools like snort or nmap, those of us in the windows world we...
内容介绍
此文档由会员 wanli1988go 发布
在IIS 网络伺候器上运行Snort Part I(外文文献翻译)
Introduction
Not too long ago when talking about network security tools like Snort or Nmap, those of us in the Windows world were often left on the outside looking in. The problem was that those tools simply were not available for any Windows platform. But recently things have changed. Snort, Nmap, Ngrep, and many other network security tools have been ported to the Win32 platform. Finally we can play too.
In a world of bloated applications and cluttered windows, the simplicity of a command-line tool such as Snort can be attractive. I am a Windows user and yet I find myself frequently opening up the command prompt for some MS-DOS action. The simple elegance of running the 175K Snort executable on a command-line is much preferable to a memory-hogging Windows application that is not any easier to learn or use.
介绍
不久以前当谈论到网络安全工具像Snort或 Nmap ,那些被我们在Windows世界中时常用做外部访问。 问题是那些工具不是任何的Windows平台可以使用的。 但是最近这种情况已经改变。 Snort, Nmap , Ngrep 和多数其他的网络安全工具已经被移植到 Win32 平台。 最后我们也能用了。
在一个充斥着许多应用软件的Windows世界中,命令行工具,像简单的Snort是很吸引人的。我是Windows的使用者,但我还是时常自己打一些MS-DOS指令。简单而高雅的在一个命令行上运行175K的 Snort命令和Windows内存申请相比,无论是对学习或是对使用都是比较容易的。
Introduction
Not too long ago when talking about network security tools like Snort or Nmap, those of us in the Windows world were often left on the outside looking in. The problem was that those tools simply were not available for any Windows platform. But recently things have changed. Snort, Nmap, Ngrep, and many other network security tools have been ported to the Win32 platform. Finally we can play too.
In a world of bloated applications and cluttered windows, the simplicity of a command-line tool such as Snort can be attractive. I am a Windows user and yet I find myself frequently opening up the command prompt for some MS-DOS action. The simple elegance of running the 175K Snort executable on a command-line is much preferable to a memory-hogging Windows application that is not any easier to learn or use.
介绍
不久以前当谈论到网络安全工具像Snort或 Nmap ,那些被我们在Windows世界中时常用做外部访问。 问题是那些工具不是任何的Windows平台可以使用的。 但是最近这种情况已经改变。 Snort, Nmap , Ngrep 和多数其他的网络安全工具已经被移植到 Win32 平台。 最后我们也能用了。
在一个充斥着许多应用软件的Windows世界中,命令行工具,像简单的Snort是很吸引人的。我是Windows的使用者,但我还是时常自己打一些MS-DOS指令。简单而高雅的在一个命令行上运行175K的 Snort命令和Windows内存申请相比,无论是对学习或是对使用都是比较容易的。