A HIDS might also identify destructive website traffic that originates from the host itself, for example when the host continues to be contaminated with any method of malware that can unfold to other methods. two. Why could Roman armies not have made terrific marches unless soldiers had been paid out in salt? The armies maybe desired salt to pre