<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: How to Detect Network Intruders (Part 1)</title>
	<atom:link href="http://www.gfi.com/blog/detect-network-intruders-part-1/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/detect-network-intruders-part-1/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=detect-network-intruders-part-1</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Will Patriousky</title>
		<link>http://www.gfi.com/blog/detect-network-intruders-part-1/comment-page-1/#comment-29285</link>
		<dc:creator>Will Patriousky</dc:creator>
		<pubDate>Thu, 23 Jun 2011 19:21:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3179#comment-29285</guid>
		<description><![CDATA[If network intruders or hackers can be detected, then why many of them are still free out there? Also, why are they brave enough to attack a system if they know they&#039;ll be caught red-handed? 

AND, why are some of the most secured systems in world hacked (CIA, Sony PlayStation, LockHeed Martin, Visa, etc)? Even big and multinational financial institutions were attacked. Remember Bank of America?]]></description>
		<content:encoded><![CDATA[<p>If network intruders or hackers can be detected, then why many of them are still free out there? Also, why are they brave enough to attack a system if they know they&#8217;ll be caught red-handed? </p>
<p>AND, why are some of the most secured systems in world hacked (CIA, Sony PlayStation, LockHeed Martin, Visa, etc)? Even big and multinational financial institutions were attacked. Remember Bank of America?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: MacTalk</title>
		<link>http://www.gfi.com/blog/detect-network-intruders-part-1/comment-page-1/#comment-29139</link>
		<dc:creator>MacTalk</dc:creator>
		<pubDate>Thu, 12 May 2011 02:41:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3179#comment-29139</guid>
		<description><![CDATA[There are several types  of intrusions: network-based intrusion, host-based intrusion, and  wireless intrusion.

Each of these types has to be dealt specifically because each one works differently from each other. Also, the way they are detected is dissimilar. 

My point is, intruders also work accordingly, whether they want to attack an SME or a large corporation. They have specialties or set of unique skills.]]></description>
		<content:encoded><![CDATA[<p>There are several types  of intrusions: network-based intrusion, host-based intrusion, and  wireless intrusion.</p>
<p>Each of these types has to be dealt specifically because each one works differently from each other. Also, the way they are detected is dissimilar. </p>
<p>My point is, intruders also work accordingly, whether they want to attack an SME or a large corporation. They have specialties or set of unique skills.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Mohammed S Ali</title>
		<link>http://www.gfi.com/blog/detect-network-intruders-part-1/comment-page-1/#comment-29075</link>
		<dc:creator>Mohammed S Ali</dc:creator>
		<pubDate>Thu, 28 Apr 2011 07:17:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3179#comment-29075</guid>
		<description><![CDATA[@CDG_IT_Guy
Thanks for your comment. Indeed the latest information is easily available on the internet, although it can take a while to find the right place to search for information that is really useful and very helpful.

@signal7
Thanks for your opinion. If an application such as IE crashes, then it means that an exception has been occurred. The reason for the occurrence of exceptions can be many. It is true that a user will not call the admin to report about such incidents. Events Monitoring is, in my opinion, the right tool to monitor and to evaluate such occurrences.

@John Gottlieb
Thanks for your comment. I am very glad to hear that you liked my first installment.]]></description>
		<content:encoded><![CDATA[<p>@CDG_IT_Guy<br />
Thanks for your comment. Indeed the latest information is easily available on the internet, although it can take a while to find the right place to search for information that is really useful and very helpful.</p>
<p>@signal7<br />
Thanks for your opinion. If an application such as IE crashes, then it means that an exception has been occurred. The reason for the occurrence of exceptions can be many. It is true that a user will not call the admin to report about such incidents. Events Monitoring is, in my opinion, the right tool to monitor and to evaluate such occurrences.</p>
<p>@John Gottlieb<br />
Thanks for your comment. I am very glad to hear that you liked my first installment.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: CDG_IT_Guy</title>
		<link>http://www.gfi.com/blog/detect-network-intruders-part-1/comment-page-1/#comment-29065</link>
		<dc:creator>CDG_IT_Guy</dc:creator>
		<pubDate>Tue, 26 Apr 2011 04:25:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3179#comment-29065</guid>
		<description><![CDATA[When the Internet was still on its infancy, i used to fear it. Back then, computer networks are not that safe - email messages can be easily intercepted, computers can be hacked, and so on and so forth. 

Today, as knowledge-based articles and online forum are growing, the latest information are easily available. This should be our primary weapon - INFORMATION.

I always believed that knowledge about a certain thing is the best way to combat intruders and other malicious computer acts. 

Thousands of useful online articles can be accessed within seconds at the comfort of your home.

Arm yourself with network and IT knowledge now...]]></description>
		<content:encoded><![CDATA[<p>When the Internet was still on its infancy, i used to fear it. Back then, computer networks are not that safe &#8211; email messages can be easily intercepted, computers can be hacked, and so on and so forth. </p>
<p>Today, as knowledge-based articles and online forum are growing, the latest information are easily available. This should be our primary weapon &#8211; INFORMATION.</p>
<p>I always believed that knowledge about a certain thing is the best way to combat intruders and other malicious computer acts. </p>
<p>Thousands of useful online articles can be accessed within seconds at the comfort of your home.</p>
<p>Arm yourself with network and IT knowledge now&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: signal7</title>
		<link>http://www.gfi.com/blog/detect-network-intruders-part-1/comment-page-1/#comment-29017</link>
		<dc:creator>signal7</dc:creator>
		<pubDate>Tue, 19 Apr 2011 15:24:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3179#comment-29017</guid>
		<description><![CDATA[I&#039;m hoping the next installment actually gets to what the title of this post says: &quot;How to Detect Network Intruders&quot;.  This is a fine explanation of how a machine gets infected, but it doesn&#039;t actually address detection of malicious activity within my network.  My users aren&#039;t going to call me because IE crashed... it does that without any malicious activity just fine on its own.]]></description>
		<content:encoded><![CDATA[<p>I&#8217;m hoping the next installment actually gets to what the title of this post says: &#8220;How to Detect Network Intruders&#8221;.  This is a fine explanation of how a machine gets infected, but it doesn&#8217;t actually address detection of malicious activity within my network.  My users aren&#8217;t going to call me because IE crashed&#8230; it does that without any malicious activity just fine on its own.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: John Gottlieb</title>
		<link>http://www.gfi.com/blog/detect-network-intruders-part-1/comment-page-1/#comment-29012</link>
		<dc:creator>John Gottlieb</dc:creator>
		<pubDate>Tue, 19 Apr 2011 08:47:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3179#comment-29012</guid>
		<description><![CDATA[An eye-opening look at just how easy it is to have your workstation infected. Most people don&#039;t realize how accountable they can be held for these kinds of intrusions and attacks, and I think this scenario mixed with those consequences have most people (like myself) wondering what we need to do to prevent that sort of thing from happening.

Looking forward to the next installment.]]></description>
		<content:encoded><![CDATA[<p>An eye-opening look at just how easy it is to have your workstation infected. Most people don&#8217;t realize how accountable they can be held for these kinds of intrusions and attacks, and I think this scenario mixed with those consequences have most people (like myself) wondering what we need to do to prevent that sort of thing from happening.</p>
<p>Looking forward to the next installment.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 05:28:50 by W3 Total Cache --