Overview
Security Administrator's Integrated Network Tool
Introduction
What is SAINT™?
Who should use it?
How does it work?
Getting Started
What you need to do to run SAINT
™
Getting and compiling all those programs
What are all the files for?
System Requirements
OS
Platform
Disk space
Memory
Required software tools
Dangers of SAINT
Controlling SAINT
™
Boundary issues - keeping track of where it goes
Being a very unfriendly neighbor
Attacking vs. probing vs. scanning
Legal problems with running SAINT
™
Design Goals
Toolkit approach
Speed/optimization
References and Acknowledgements
Acknowledgements
Copyright notice
About the authors