<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
  <meta content="text/html; charset=ISO-8859-1"
 http-equiv="Content-Type">
</head>
<body text="#000000" bgcolor="#ffffff">
<a class="moz-txt-link-freetext" href="http://docs.google.com/viewer?url=http://www.vabo.cz/spi/2009/presentations/03/02-celeda_rehak_CAMNEP_no_video.pdf">http://docs.google.com/viewer?url=http://www.vabo.cz/spi/2009/presentations/03/02-celeda_rehak_CAMNEP_no_video.pdf</a><br>
<br>
For a demo :<br>
<br>
<a class="moz-txt-link-freetext" href="http://demo.cognitivesecurity.cz/">http://demo.cognitivesecurity.cz/</a><br>
<br>
Best Regards,<br>
<br>
Guillaume FORTAINE<br>
Tel : +33(0)631092519<br>
<br>
On 07/05/2010 09:04 AM, Steve Skeevens wrote:
<blockquote
 cite="mid:AANLkTimnKpffryNKyoUURgmIdJ1kqF2T1UGbEOEHmowz@mail.gmail.com"
 type="cite">Hi guys,<br>
  <br>
Wondering how many of you analyse your end-users' flows for general
anomalies, known malware/botnet signatures or other stuff for the
purpose of detecting infected/owned boxes?   No need to get too
specific.  In some regions it seems to be pretty common, from what I've
seen/heard it's not so much done here.<br>
  <br>
Regards,<br>
Steve<br>
  <pre wrap="">
<fieldset class="mimeAttachmentHeader"></fieldset>
_______________________________________________
AusNOG mailing list
<a class="moz-txt-link-abbreviated" href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a>
<a class="moz-txt-link-freetext" href="http://lists.ausnog.net/mailman/listinfo/ausnog">http://lists.ausnog.net/mailman/listinfo/ausnog</a>
  </pre>
</blockquote>
<br>
</body>
</html>