Article aug2006.tar

syslog

In a call for papers that we ran a few years ago, the technical editor asked for articles covering intrusion detection tools "but not Snort" because we had recently run several articles on Snort, and it seemed as if we'd covered it sufficiently for the time being. Time goes on, however, and there are lots of new things to say about Snort, which is "the most widely deployed intrusion detection and prevention technology worldwide" according its Web site. In this issue, three articles provide different perspectives on using Snort.

In "Tuning Snort", Richard Bejtlich explains how to tune Snort to reduce the number of alerts it produces, thus increasing security and improving an administrator's productivity all at the same time.

Matthew Jonkman contributes "Three Free Tools to Detect and Prevent Spyware and Malware at the Network Perimeter", in which he describes some open source tools and techniques, such as DNS blackholing, user agent filtering, and various intrusion detection software, that can help increase your system's security. Jonkman, by the way, is the co-founder of Bleeding Snort, which is "a Free Zone for Snort IDS signature development, and a number of other related security projects." According to the home page, this site takes Snort Signatures and organizes them into coherent rulesets, then distributes them free of charge to all who are interested. At the time of writing, the site had just posted a call for a few admins to help review and process new data sources. So, for more information on Bleeding Snort and how to contribute to this effort, please see: http://www.bleedingsnort.com/.

Russ McRee also talks about Snort in his article, "Extrusion Detection with Aanval and Bleeding Edge Snort". McRee focuses on the use of Aanval (a data management and analysis console designed specifically for Snort) in conjunction with Bleeding Snort rules to detect spyware as well as IM and P2P network violations. You can learn more about this "extrusion detection" approach in Richard Bejtlich's new book, Extrusion Detection: Security Monitoring for Internal Intrusions, which was reviewed on UnixReview.com at:

http://www.unixreview.com/documents/s=10083/ur0605h/ur0605h.html
            
Also on UnixReview.com in recent days, Marcel Gagné's "Linux Game of the Month" covered SolarWolf, which Marcel says is a "superb" arcade-style game inspired by the old Atari game, SolarFox. Ed Schaefer's "Shell Corner" column featured "Bash Dynamically Loadable Built-In Commands" by Chris F.A. Johnson, which you can read at:

http://www.unixreview.com/documents/s=10089/ur0606a/ur0606a.htm
And, Emmett Dulaney examined the new Ubuntu Professional Certification. If you need some experience with Ubuntu Linux before tackling professional certification, check out Marcel Gagné's brand new book Moving to Ubuntu Linux, which is due to be published in August by Addison-Wesley; see: http://www.marcelgagne.com/mtubuntu.html for more information.

Also, please note that we're currently working on a Linux supplement to accompany the October "Server Management" issue. It's not too late to submit an article for consideration in either of these issues. If you'd like to contribute, please send your proposals and manuscripts to Rikki Endsley (rendsley@cmp.com), and she'll provide all the details of our process.

Sincerely yours,

Amber Ankerholz
Editor in Chief