II. The Problem
III. The Technique
IV. Architectures
V. Configuration
A. OS B. Snort C. syslog-ng
VI. Challenges, Hints, and Audience Participation
VII. Conclusion