From Part 1:
“Nowadays, basic information security at any level should
include an intrusion detection system (IDS) that gathers and later
analyzes intrusion data. The primary goal of IDS software is
monitoring hostile operations of all types, whether human (hackers
and crackers) or programmatic (viruses, Trojan horses). An IDS can
function on a particular server or in an entire segment of a
network.“Although the market for IDS-related software is pretty large,
finding a tool that will work for your specific case isn’t always
easy…”
Complete
Story (Part 1)
Complete
Story (Part 2)