research reputable gov mil edu or respected com bloggers or news sources resources of the internet for useful snort rules or configurations

Snort IDS Rules

1. Research reputable (.gov, .mil, .edu, or respected .com bloggers or news sources ) resources of the Internet for useful Snort Rules or Configurations.

2.In a short paragraph list two useful Snort rules and/or configuration options and describe what they do and what contribution to IT Security they make. Do not repeat class work or other classmates’ posts. Properly reference, and cite your research in in MLA