[513] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Intro

daemon@ATHENA.MIT.EDU (Rob J. Nauta)
Mon Jan 29 15:53:36 1996

From: "Rob J. Nauta" <rob@brasaap.IAEhv.nl>
To: ids@uow.edu.au
Date: Sun, 28 Jan 1996 17:57:35 +0100 (MET)
Reply-To: ids@uow.edu.au

Please allow me to introduce myself.

I'm a 29 year old person from Holland, Europe. I've used computers since
I was 12 and on Internet since the university I was attending got
connected, in february 1990. 
I've always been interested in computer and internet security, not just
in finding weaknesses in systems but also on securing them. Of course
security also means detecting intrusion attempts. I believe the best
way to understand security is to know the technical details, the protocols 
and the methods and tools the intruders use.
I am now a consultant and work for a small computer firm. In this
position I sometimes also install UNIX systems for companies though
this is not my main occupation. At home I run Linux which I secured not
just with tcp_wrappers but also with ICMPtrace, port-scanning detectors
etc.

Rob
-- 
      -=*=-	| Across 50 states of mind, I didn't feel inclined. You waited
  Rob J. Nauta	| yesterday, I didn't come your way. Now time is moving on,
  rob@iaehv.nl	| I know it won't be long.  Till I'm shuffling away, with
      -=*=-	| nothing more to say. (Ride - 'Going blank again')

home help back first fref pref prev next nref lref last post