Each time I try to update an old article about network intrusion detection systems, it gets tougher.
Snort
You come into work to discover that your Mac or server have been hacked, or appears to be under the control of an intruder. What do you do next?
