(When deploying the intrusion/intrusion detection system, the snort intrusion/intrusion detection system is selected, so that the comprehensive network can discover the intrusion/intrusion behavior in time.
_rels\.rels
Snort_2_6_1_3_Installer.exe
.....too many files .....)