Info on STALKER

jkahn@smiley.mitre.org
Fri, 28 Oct 94 11:16:21 EDT

At  8:19 AM 10/28/94 -0400, Jim Truitt wrote:

>>Is there anybody who can give some substantial informations about the
>>intrusion detection system Stalker ?

>Contact Donna Herrin at Haystack Labs.
>(512) 918-3555
>
>I'm sure she will be glad to send you a nice package on Stalker.
>
>Jim Truitt


There is an electronic way to reach STALKER information.  I sent an email
to info@hli.com

To simplify this, here is what comes back:

==========

Date: Fri, 28 Oct 1994 07:39:21 -0700
From: daemon@holonet.net (HoloNet Background Processor)
Message-Id: <199410281439.HAA02191@guardian.holonet.net>
To: jkahn@mitre.org
Subject: info

info
Last updated 17 Oct 94

You have reached the automated responder for Haystack Labs, Inc., a
software company that designs and develops Unix security tools.

This file is sent in response to any email message to:
                info@hli.com or info@mailer.hli.com

There are other files available from this responder system, and new
ones are added frequently.  All files are ASCII; any binary files are
uuencoded.  Any of these files will be emailed to you in response to
email sent to:
                filename@mailer.hli.com
where filename is listed in the leftmost column below.

We would appreciate it if you would provide your contact information
(name/address/phone) in the body of your message, but the system works
without it.

If you have problems using this system, please send email to:
                smaha@hli.com
                     OR
                smaha@dockmaster.ncsc.mil
or call us at the phone number below.

-------------------------------------------------------------------
-------------------------------------------------------------------
                Approx.
Filename        Size (KB) Contents
-------------------------------------------------------------------
-------------------------------------------------------------------

info            5         this file
events          2         upcoming talks and trade shows where you
                          can see our products and/or hear about our
                          technologies

-------------------------------------------------------------------
product:
-------------------------------------------------------------------

overview        4         product overview of Stalker (TM), Haystack Labs'
                          software for misuse detection and audit trail
                          analysis on Unix platforms
ac              2         data sheet on Audit Control features;
                          format is an ASCII file without graphics
ac.uue         72         data sheet on Audit Control features;
                          format is a uuencoded .eps.Z file with graphics
tb              3         data sheet on Tracer/Browser features
                          for queries and report generation;
                          format is an ASCII file without graphics
tb.uue         52         data sheet on Tracer/Browser features
                          for queries and report generation;
                          format is a uuencoded .eps.Z file with graphics
md              3         data sheet on Misuse Detector features;
                          format is an ASCII file without graphics
md.uue         72         data sheet on Misuse Detector features;
                          format is a uuencoded .eps.Z file with graphics

-------------------------------------------------------------------
legal:
-------------------------------------------------------------------

demo_agr.eps   94         Postscript version of demo agreement;
                          required to get an evaluation copy of our
                          products.
demo_agr        8         ASCII version of demo agreement;
                          required to get an evaluation copy of our
                          products.

-------------------------------------------------------------------
research:
-------------------------------------------------------------------
14idswrk.uue   49         presentation slides used by Steve Smaha at the
                          14th Intrusion Detection Systems Workshop in
                          Baltimore, MD, on 13 Oct 94; talk was entitled
                          "Using Non-Audit Data For Misuse Detection",
                          and describes an application of the Stalker
                          product to a high-grade firewall;
                          format is a uuencoded .eps.Z file with graphics
biblio         20         bibliography of papers on intrusion detection
filters        ??         NOT YET AVAILABLE - AWAITING AUTHORIZATION
hli_biblio      3         bibliography of security-related papers by
                          Haystack Labs' staff
svr4.p22       17         version 2.2 of specification for svr4++ audit data
                          interchange format for Unix operating systems
svr4prep.uue  135         C source code for reference implementation
                          of preprocessor for converting SunOS BSM
                          audit trails to svr4++ format;
                          format is a uuencoded .tar.Z file;
                          unsupported, use at own risk, etc.;
                          see "fine print" in the file headers;
                          note that this is for rev 1.0 of svr4++ spec,
                                                  NOT the current one.

-------------------------------------------------------------------
-------------------------------------------------------------------

Other ways you may reach us:

    post:       Haystack Labs, Inc.
                10713 RR620 North, Suite 521
                Austin, TX 78726
                USA

    phone:      512-918-3555

    fax:        512-918-1265

Copyright (c) 1994 by Haystack Labs, Inc.  All rights reserved.
Stalker is a registered trademark of Haystack Labs, Inc.  All other
trademarks belong to their respective owners.  Specifications subject
to change without notice.