4 More Discussions You Might Find Interesting
1. What is on Your Mind?
New "Beginners" Video:
Hello World Linux - Morning Server Tasks with Your First Coffee
https://www.youtube.com/watch?v=A0X1_at7JP8 (0 Replies)
Discussion started by: Neo
0 Replies
2. Cybersecurity
Is it possible to rule out in alert all HTTPS traffic or rule out all the HTTPS trafic from the alerts on snort ? (3 Replies)
Discussion started by: drd0spt
3 Replies
3. What is on Your Mind?
Coffee. That hot black liquid that maintains my sanity when transitioning between day and night schedules. I like to mix it up a lot. Sometimes I like a plain old cup of coffee with no condiments and other times I want creamy, overly sweet espresso based beverage such as cappuccino. How do you like... (14 Replies)
Discussion started by: ilikecows
14 Replies
4. Post Here to Contact Site Administrators and Moderators
I've noticed that many sites like this one have a forum that is a freewheeling lounge where people can talk about whatever they want without the strict rules of the forums. I've been very hesitant to do this for many reasons (reasons I'd prefer not to go into, thanks!).
Anyway... here is a... (1 Reply)
Discussion started by: Neo
1 Replies
LEARN ABOUT DEBIAN
suricata
SURICATA(8) System Manager's Manual SURICATA(8)
NAME
suricata - Next Generation Intrusion Detection and Prevention Tool
SYNOPSIS
suricata [options]
DESCRIPTION
suricata is a network Intrusion Detection System (IDS). It is based on rules (and is fully compatible with snort rules) to detect a variety
of attacks / probes by searching packet content.
This new Engine supports Multi-Threading, Automatic Protocol Detection (IP, TCP, UDP, ICMP, HTTP, TLS, FTP and SMB), Gzip Decompression,
Fast IP Matching and coming soon hardware acceleration on CUDA and OpenCL GPU cards.
It supports acquiring packets through NFQUEUE, PCAP (live or offline) etc.
OPTIONS
-c config_file
Use configuration file config_file
-i interface
Sniff packets on interface.
-r file
Read the tcpdump-formatted file tcpdump-file. This will cause Suricata to read and process the file fed to it. This is useful for
offline analysis.
-q queue_id
Sniff packets sent by the kernel through NFQUEUE. This allows running Suricata in inline mode (IPS) for packets captured by iptables
using the NFQUEUE target.
-s signatures
Path to the signatures file.
-l log_dir
Path to the default log directory.
-D Run as daemon
--init-errors-fatal
Enable fatal failure on signature init error.
SEE ALSO
tcpdump(1), pcap(3).
AUTHOR
suricata was written by the Open Information Security Foundation.
This manual page was written by Pierre Chifflier <pollux@debian.org>, for the Debian project (and may be used by others).
February 2010 SURICATA(8)