At 10:14 AM 11/6/95 NZDT, Jeff Law wrote: >So I am interested in hearing of anything that could be used to automate >monitoring of systems, and anything else regarding security of systems. This is off-topic, so followups should be off-list. In case any other readers are in the same predicament, one more and more common as firms move toward network access, I recommend subscribing to both the Firewalls and Academic Firewalls mail list. Discussions there revolve around network security, techniques, tools, and vulnerabilities. To subscribe to Firewalls, send an email to majordomo@GreatCircle.com containing in the body: subscribe firewalls. For Academic Firewalls, send an email to majordomo@net.tamu.edu containing in the body: subscribe academic-firewalls. The "bible" for this topic, required reading for anyone pretending to maintain network security, is "Firewalls and Internet Security" by Cheswick and Bellovin, Addison-Wesley (1994). In addition to containing invaluable technical information, this book has pointers to sites from which security tools may be downloaded. -- Robin Felix; felix@delfin.com; felix@nosc.mil 619-291-2194(work), 619-291-5852(fax), 619-991-5081(alt) http://www.delfinsd.delfin.com/