{"id":64,"date":"2007-12-03T22:50:34","date_gmt":"2007-12-04T02:50:34","guid":{"rendered":"http:\/\/www.ale.org\/new\/2007\/12\/03\/ale-central-mtg-for-thursday-december-6th\/"},"modified":"2007-12-03T22:53:14","modified_gmt":"2007-12-04T02:53:14","slug":"ale-central-mtg-for-thursday-december-6th","status":"publish","type":"post","link":"https:\/\/ale.org\/?p=64","title":{"rendered":"ALE Central Mtg. for Thursday, DECEMBER 6TH"},"content":{"rendered":"<p>To accommodate Emory Law School&#8217;s room scheduling at<br \/>\nour donated venue we have moved our December 2007<br \/>\nCentral meeting date up by 1 week.  Instead of the second<br \/>\nThursday, this month&#8217;s ALE Central meeting will be held<br \/>\n<strong> THURSDAY, DECEMBER 6 at 7:30 pm.,<br \/>\nand our feature presentation for the evening will be<br \/>\n<font size=\"+1\"><br \/>\nUsing Snort To Sniff Out Content-Based Network Attacks<br \/>\n<\/font><br \/>\npresented by Bob Toxen<br \/>\n<\/strong><\/p>\n<p>Synopsis:<br \/>\n&#8212; Snort is the free Open Source tool of choice for spotting and blocking<br \/>\nattacks hiding in normal network traffic (IDS and Intrusion Prevention).<br \/>\nIt is good at recognizing content-based attacks aimed at allowed services<br \/>\nand hiding in browser and mail traffic to your client systems as well<br \/>\nas simpler port-based attacks.  This presentation will cover basic<br \/>\ninstallation and use so that you can take advantage of this excellent<br \/>\ntool.<\/p>\n<p>Bio:<br \/>\n&#8212; Mr. Bob Toxen, one ALE&#8217;s founding members, is the author of Real World<br \/>\nLinux Security [Second Edition, 848pp published by Prentice Hall PTR].<br \/>\nHe is a world-class expert on Linux and UNIX security and mixed-OS network<br \/>\nsecurity using Linux.  His 30+years of UNIX\/Linux experience includes being<br \/>\none of the 162 developers of Berkeley UNIX and being one of the four creators<br \/>\nof Silicon Graphics&#8217; UNIX.<br \/>\n&#8212; Mr. Toxen&#8217;s consulting focuses on network and computer security using<br \/>\nlow cost Linux solutions for virus and spam filters, hardening Linux servers,<br \/>\nfirewalls, VPNs, and more.<\/p>\n<p>============================<br \/>\nMeeting time frame is 7:30pm to ~9:30pm<br \/>\nDirections to Emory Law School can be found<br \/>\n<strong><a href=\"http:\/\/www.ale.org\/new\/directions-to-ale-central\/\">HERE<\/a><\/strong> (or via the side bar link).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meeting week moved up!<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-64","post","type-post","status-publish","format-standard","hentry","category-ale-central","category-announcements"],"_links":{"self":[{"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/posts\/64","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ale.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=64"}],"version-history":[{"count":0,"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/posts\/64\/revisions"}],"wp:attachment":[{"href":"https:\/\/ale.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=64"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ale.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=64"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ale.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}