SANS Internet Storm Center
The ISC relies on an all-volunteer effort to detect problems, analyze the threat, and disseminate both technical as well as procedural information to the general public. Thousands of sensors that work with most firewalls, intrusion detection systems, home broadband devices, and nearly all operating systems are constantly collecting information about unwanted traffic arriving from the Internet. These devices feed the DShield database where human volunteers as well as machines pour through the data looking for abnormal trends and behavior. The resulting analysis is posted to the ISC's main web page where it can be automatically retrieved by simple scripts or can be viewed in near real time by any Internet user.
Recent blog post
ISC Handler Lenny Zeltser's REMnux v4 Reviewed on Hak5, (Thu, Apr 18th)
Earlier this money, Lenny released version 4 of REMnux , a lightweight Ubuntu Linux-based distro for analyzing malware. It was recently reviewed on Hak5 . Take a look and if you haven't already, download the image and send Lenny your feedback. -- John B...4 weeks ago
Recent Influential Reactions
User reviewsPersonal attacks are NOT allowed
Please read our comment policy