Re: [ilugd]: (fwd) Re: Talk at JNU

2002-03-16 Thread Naresh Narang
How wonderful it will be if someone could broadcast it over Internet. (audio and video) Thanks Naresh --- Raju Mathur <[EMAIL PROTECTED]> wrote: > > "Nishi" == Nishikant Kapoor > <[EMAIL PROTECTED]> writes: > > Nishi> Raju Mathur wrote: > >> RMS has agreed to the talk at JNU. All

Re: [ilugd]: (fwd) Re: Talk at JNU

2002-03-16 Thread Naresh Narang
How wonderful it will be if someone could broadcast it over Internet. (audio and video) Thanks Naresh --- Raju Mathur <[EMAIL PROTECTED]> wrote: > > "Nishi" == Nishikant Kapoor > <[EMAIL PROTECTED]> writes: > > Nishi> Raju Mathur wrote: > >> RMS has agreed to the talk at JNU. All

[ilugd]: RMS's Talk

2002-03-16 Thread Sanjeev \"Ghane\" Gupta
Folks, ...and why not start a distro war, among the many that RMS will ignite as he passes through. See http://www.xach.com/debian-users-are-beatniks.html for a take on the typical Debian user. The guy on the right is RMS, and I will pay my ILUG dues if he doesn't pop on the same hat at Sarai.

[ilugd]: Intrusion Detection System

2002-03-16 Thread Varun Varma
Hi! Snort is a tool (http://www.snort.org) that provides IDS functionality, pretty much like iplog. This seems a bit fancier though - experimental built in route deletion etc. Claim to fame - made to a Gartner Group Report on IDSs', alongwith Cisco et. al. You can see the link to the report somew

Re: [ilugd]: RMS's Talk

2002-03-16 Thread Ankit Mohan
* Sanjeev Ghane Gupta <[EMAIL PROTECTED]> [16:36 16/03/02]: > ...and why not start a distro war, among the many that RMS will ignite as he > passes through. See http://www.xach.com/debian-users-are-beatniks.html for > a take on the typical Debian user. The guy on the right is RMS, and I will > p

[ilugd]: Intrusion Detection System

2002-03-16 Thread Raju Mathur
Hi Varun, Snort, iplog and portsentry are different tools for different purposes: - Snort: full-blown network IDS. Snoops packets on the ethernet and takes actions if it finds packets matching user-specified rules. Actions could include logging the connection, alerting an administrator, resetti