Network architect Todd Sanders uses well-known open source tools, like Snort and Nessus, to build secure networks. But Sanders, who works for Centrepetal Solution Strategies LLP, a systems integration and systems security firm in Bowie, Md., is willing to take roads less traveled. . . .
Network architect Todd Sanders uses well-known open source tools, like Snort and Nessus, to build secure networks. But Sanders, who works for Centrepetal Solution Strategies LLP, a systems integration and systems security firm in Bowie, Md., is willing to take roads less traveled. In part one of this two-part interview, he explained how Linux, Snort, and Nessus help Centrepetal build secure networks for businesses. In this interview, he offers a granular look at his work with POP Mail, Simple Network Management Protocol (SNMP) and F-Prot.

You have used POP Mail -- the protocol that allows single user hosts to read mail from a server -- for giving certificates to e-mail users. In what circumstances is this appropriate?

Todd Sanders: It is appropriate in all circumstances, due to the security implications behind it. We feel that, in security, the most important aspect of IT is the end user and/or the client.

The link for this article located at Jan Stafford is no longer available.