On Tue, 2008-06-10 at 17:16 -0400, Hira Agrawal wrote: > Our approach involves examining "events" that get generated as a side > effect of normal call processing and analyzing them, or some appropriate > transformations of those events, against "normal", expected application > behavior.
so its like systrace.org? A free open source security tool that lets you filter system calls limiting what can be called, which arguments are valid, how many times a particular thing can be called, what sections of the filesystem are allowed, etc? -- Trixter http://www.0xdecafbad.com Bret McDanel Belfast +44 28 9099 6461 US +1 516 687 5200 http://www.trxtel.com the phone company that pays you! _______________________________________________ --Bandwidth and Colocation Provided by http://www.api-digital.com-- asterisk-biz mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-biz
