Introduction1.1. Installing Snort from Source on Unix1.2. Installing Snort Binaries on Linux1.3. Installing Snort on Solaris1.4. Installing Snort on Windows1.5. Uninstalling Snort from Windows1.6. Installing Snort on Mac OS X1.7. Uninstalling Snort from Linux1.8. Upgrading Snort on Linux1.9. Monitoring Multiple Network Interfaces1.10. Invisibly Tapping a Hub1.11. Invisibly Sniffing Between Two Network Points1.12. Invisibly Sniffing 100 MB Ethernet1.13. Sniffing Gigabit Ethernet1.14. Tapping a Wireless Network1.15. Positioning Your IDS Sensors1.16. Capturing and Viewing Packets1.17. Logging Packets That Snort Captures1.18. Running Snort to Detect Intrusions1.19. Reading a Saved Capture File1.20. Running Snort as a Linux Daemon1.21. Running Snort as a Windows Service1.22. Capturing Without Putting the Interface into Promiscuous Mode1.23. Reloading Snort Settings1.24. Debugging Snort Rules1.25. Building a Distributed IDS (Plain Text)1.26. Building a Distributed IDS (Encrypted)