Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Honeypots
Go to: HSC Trainings
Version française
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o Training courses
o E-learning
o Agenda
o Past events
o Tutorials
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
o HSC Newsletter
o Press review
o Press releases
o Publications
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
> Access to the content HTML Beginning of the presentation
PDF PDF version [113KB]  
> Description  
> Context & Dates Talk made before the SUR group from the OSSIR , on 12 March 2002.
> Author Nicolas Jombart and Yann Berthier 
> Type 31 slides [ French - HTML ]
Also available as PDF file [PDF - 113KB]  
> Abstract &
Table of content
Pour résumer
Que cherchons nous ?
Trois problématiques
Surveillance - Collecte d'informations
Analyse des informations
Elément filtrant
Flux autorisés
Détection d'intrusion
Exemple réel : dtspcd
> Related documents
[Presentation]  Intrusion detection and network forensic [6 May 2004 - French]
[Presentation]  Ethereal, a multi-purpose network analyzer - how to detect viruses and worms with network analysis [4 May 2004 - French]
[Presentation]  Network Flows based forensics of a honeypot [9 March 2004 - French]
[Techno-watch]  CanSecWest 2002 Conference [4 May 2002 - French]
[Theme]  Intrusion Detection
> Copyright © 2002, Hervé Schauer Consultants, all rights reserved.


Last modified on 17 April 2002 at 17:17:38 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants