Jason Harper

Jason
Harper

Jason Harper is a senior security engineer for a global company. He works on the policies and procedures that support network security technology.

Articles
Deploy Your Network IDS Effectively 2
Where you place your network Intrusion Detection System (IDS) sensors and how you manage the information they provide are crucial factors in how well the IDS protects your network.
Placing Your Controls
When you create ACLs or filters, you must tell the router when to apply them. You’ll want to place them so that your system uses router processing cycles efficiently.
Protect Your Network from Intrusion
A properly placed network IDS, such as Snort, is an important component of your defense-in-depth approach to network security.
IDS Signature Analysis
In signature analysis, the sensor looks not only at the header information, flags set, and packet shape, but also at the contents of the datagram-typically referred to as the packet payload.
Windows Powershell Master Class

Windows Powershell Master Class with John Savill
Live Online Training on February 2nd, 9th, and 16th
Register by January 26th and Save 20%!

PowerShell is the definitive command line interface and scripting solution for Windows, Hyper-V, System Center, Microsoft solutions and beyond. In this Master Class, we will start from the ground up, walking you through the basics of PowerShell, how to create basic scripts and building towards creating custom modules to achieve amazing results in your environment, in non-Microsoft environments, and in Azure.

 

Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×