Talk:Intrusion detection

how the tools can run in Widows Environment