Hello. In Snort, how a digital signature is actually created
for the authentication purpose and thereby provides
intrusion detection as well as prevention. How the software
for IDS/IPS comes to know regarding the
threat/vulnerability using digital signature ? Whether any
specific language or programming is used or not.
Answer Posted / dj
NEED AN ANSWER
| Is This Answer Correct ? | 1 Yes | 3 No |
Post New Answer View All Answers
What are the disadvantages of public-key cryptography compared with secret-key cryptography?
why hash functions are not used for encryption but authentication ?
What is decryption?
Does encryption of connection strings in web.config file possible? How?
What is the Popular Symmetric-Key Encryption Method
what is pretty good privacy?
What is the rabin signature scheme?
What is secret-key cryptography ?
What are some other public key cryptosystems ?
What are "stream" and "block" ciphers?
How to change the encrypted file icon?
What is the elgamal cryptosystem?
whats cryptanalysis?
What is merkles tree signature scheme?
What is exhaustive key search ?