Snort mailing list archives
Snort.org Blog: Sourcefire VRT Certified Snort Rules Update for 10/31/2013
From: Joel Esler <jesler () sourcefire com>
Date: Thu, 31 Oct 2013 16:10:14 -0400
http://blog.snort.org/2013/10/sourcefire-vrt-certified-snort-rules_31.html Sourcefire VRT Certified Snort Rules Update for 10/31/2013 We welcome the introduction of the newest rule release for today from the VRT. In this release we introduced 27 new rules and made modifications to 7 additional rules. There were three changes made to the snort.conf in this release: The following ports were added to HTTP_PORTS, http_inspect ports, and Stream5's tcp (both) sections: 51423 44440 33330 15489 The Snort.confs on the example page have been updated: http://www.snort.org/vrt/snort-conf-configurations/ -- Joel Esler AEGIS Intelligence Lead OpenSource Community Manager Vulnerability Research Team, Sourcefire
------------------------------------------------------------------------------ Android is increasing in popularity, but the open development platform that developers love is also attractive to malware creators. Download this white paper to learn more about secure code signing practices that can help keep Android apps secure. http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs http://www.snort.org Please visit http://blog.snort.org for the latest news about Snort!
Current thread:
- Snort.org Blog: Sourcefire VRT Certified Snort Rules Update for 10/31/2013 Joel Esler (Oct 31)
- Re: Snort.org Blog: Sourcefire VRT Certified Snort Rules Update for 10/31/2013 Anshuman Anil Deshmukh (Nov 02)
- Re: Snort.org Blog: Sourcefire VRT Certified Snort Rules Update for 10/31/2013 Joel Esler (Nov 02)
- Re: Snort.org Blog: Sourcefire VRT Certified Snort Rules Update for 10/31/2013 Anshuman Anil Deshmukh (Nov 02)