Tuesday, 03.19.2024, 7:00 AM

Ethical Hacking - By Chintan Gurjar

Site menu
Calendar
«  December 2010  »
SuMoTuWeThFrSa
   1234
567891011
12131415161718
19202122232425
262728293031
Our poll
Rate my site
Total of answers: 171

Main » 2010 » December » 09



An intrusion detection system (IDS) is used to monitor the entire network, it detects intruders; that is, unexpected, unwanted or unauthorized people or programs on network.
An intrusion detection system have a number of sensors that is used to detect unwanted or unexpected flow of network traffic, the major sensors as follows:




Views: 5403 | Added by: handsome_devil | Date: 12.09.2010 | Comments (2)

WikiLeaks Reveled The Biggest Cybercrime of All Time

SOURCE: Cat Techie


Views: 1214 | Added by: handsome_devil | Date: 12.09.2010 | Comments (0)