Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Items tagged with: Snort

Build Your Own UTM With pfSense - Part 2

pfSense logoIn the second part of our series, we start the upgrade of our pfSense-based box from IDS to UTM.

Build Your Own UTM With pfSense - Part 1

pfSense logoIn the first part of our series, we see if pfSense can be configured to perform UTM duties.

Build Your Own IDS Firewall With pfSense

PFSense logoWe'll show you how to get enterprise grade network protection by making your own intrusion detection firewall with pfSense.

Nmap getting SNORTed

Open source innovator and SNORT creator, Sourcefire, Inc., and Insecure.Org, the creator of the Nmap Security Scanner, today announced a licensing agreement for the parties to jointly develop open source vulnerability scanning technology based on the general purpose Nmap Scripting Engine (NSE) embedded within the Nmap network discovery tool.

Under the agreement, Insecure.Org will develop the engine while the Sourcefire Vulnerability Research Team (VRT) will develop and contribute plug-ins for discovering specific vulnerabilities.

Snort vulnerability found

On Monday, Sourcefire — the company behind the open-source intrusion-detection application Snort — said that hackers could potentially execute malicious code on a system running Snort and gain access to confidential data.

The vulnerability was reported to Sourcefire by Internet Security Systems (ISS), the security arm of IBM.

Full story on ZDNet UK

How To: Sniffing the Air

The nice thing about wireless LANs is that you don't have to be physically connected to use them. But that strength also opens the door to security problems. Derek Boiko-Weyrauch shows you how a popular open source tool can be used to keep tabs on WLAN activity.
Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

As some may have seen in a previous post I have been looking or a new router because my EA9300 is rejecting connections on the 5GHz-2 band which I hav...
As per the title, I am wondering whether this is actually possible.I have a VPN running on Client 1 using policy routing and have set 'accept DNS conf...
View attachment 21040​ One of the first Wi-Fi Certified EasyMesh network devices to hit the home networking market, the D-Link COVR-1102 AC1200 Dual ...
Does anyone know how I can transfer the client names of my router to all my assess pointsI have about 150 devices and would like to transfer them to f...
I have an Asus 68u (with ExpressVPN firmware on it) connected to my Altice routers LAN port. For some reason when I go to 192.168.1.1 I access my Alti...

Don't Miss These

  • 1
  • 2
  • 3