"Once you've confirmed that Snort can run on your customer's
hardware, and ensured that the proper software for Snort has been
installed on Red Hat Enterprise Linux 5 to support Snort, the next
step is to download Snort, then configure, make and install the
package with MySQL. This is necessary before you can configure
Snort by setting up its network intrusion detection rules.
"To compile Snort you will need to have the standard C
development and build tools installed on your host. You can always
remove these tools after compilation to ensure they can't be used
inappropriately. Download the Snort source code package..."
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.