<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: How to Detect Network Intruders (Part 2)</title>
	<atom:link href="http://www.gfi.com/blog/detect-network-intruders-part-2/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/detect-network-intruders-part-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=detect-network-intruders-part-2</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Simon</title>
		<link>http://www.gfi.com/blog/detect-network-intruders-part-2/comment-page-1/#comment-29346</link>
		<dc:creator>Simon</dc:creator>
		<pubDate>Sun, 10 Jul 2011 07:41:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3181#comment-29346</guid>
		<description><![CDATA[I&#039;d add never ever allow P2P in your network - in any form. These file sharing networks, even when they are not violating intellectual rights, are an incubator of all things malware. In a business environment, peer-to-peer has no place. Your users don&#039;t need it for their jobs, so there is no excuse to allow its bare existence.]]></description>
		<content:encoded><![CDATA[<p>I&#8217;d add never ever allow P2P in your network &#8211; in any form. These file sharing networks, even when they are not violating intellectual rights, are an incubator of all things malware. In a business environment, peer-to-peer has no place. Your users don&#8217;t need it for their jobs, so there is no excuse to allow its bare existence.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: CDG_IT_Guy</title>
		<link>http://www.gfi.com/blog/detect-network-intruders-part-2/comment-page-1/#comment-29064</link>
		<dc:creator>CDG_IT_Guy</dc:creator>
		<pubDate>Tue, 26 Apr 2011 04:14:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3181#comment-29064</guid>
		<description><![CDATA[Software is never bug-free, so as computer networks and IT systems. The best way to detect network intruder is to arm yourself with knowledge and skill. Keep yourself updated with the latest tips, tricks, and technology news about networking system. Technology evolves - so as intruders and hackers.

Even if you&#039;re not the webmaster or the network admin, you can still detect harmful network injections if you arm yourself with these knowledge.]]></description>
		<content:encoded><![CDATA[<p>Software is never bug-free, so as computer networks and IT systems. The best way to detect network intruder is to arm yourself with knowledge and skill. Keep yourself updated with the latest tips, tricks, and technology news about networking system. Technology evolves &#8211; so as intruders and hackers.</p>
<p>Even if you&#8217;re not the webmaster or the network admin, you can still detect harmful network injections if you arm yourself with these knowledge.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Chris Lorrel</title>
		<link>http://www.gfi.com/blog/detect-network-intruders-part-2/comment-page-1/#comment-29060</link>
		<dc:creator>Chris Lorrel</dc:creator>
		<pubDate>Mon, 25 Apr 2011 16:19:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3181#comment-29060</guid>
		<description><![CDATA[Cameron is right that being an early adopter is pretty risky - you are like a beta tester and you take all the risks. Also, to catch intruders, keep an eye on logs - even if you don&#039;t get an alert, checking the logs every now and then is good prevention.]]></description>
		<content:encoded><![CDATA[<p>Cameron is right that being an early adopter is pretty risky &#8211; you are like a beta tester and you take all the risks. Also, to catch intruders, keep an eye on logs &#8211; even if you don&#8217;t get an alert, checking the logs every now and then is good prevention.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Cameron Leaf</title>
		<link>http://www.gfi.com/blog/detect-network-intruders-part-2/comment-page-1/#comment-29054</link>
		<dc:creator>Cameron Leaf</dc:creator>
		<pubDate>Sun, 24 Apr 2011 09:35:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3181#comment-29054</guid>
		<description><![CDATA[Definitely highlighting the importance of a good monitoring scheme right here. 

I would say another safety measure one could take in regards to common software is avoid being an early adopter. How many times have we seen AAA-list programs roll out new versions, only to have security patch after security patch applied in the following weeks? Waiting a month or two can make a big difference in limiting the risks you put your own machine under.]]></description>
		<content:encoded><![CDATA[<p>Definitely highlighting the importance of a good monitoring scheme right here. </p>
<p>I would say another safety measure one could take in regards to common software is avoid being an early adopter. How many times have we seen AAA-list programs roll out new versions, only to have security patch after security patch applied in the following weeks? Waiting a month or two can make a big difference in limiting the risks you put your own machine under.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:25:41 by W3 Total Cache --