This article evaluates four network Intrusion Detection System products: Internet Security Systems Proventia G200, Lancope StealthWatch 4.0, Snort 2.10, and StiliSecure Border Guard 4.3 against both live Internet traffic and a variety of attacks that were launched from penetration testing tool Core Impact 4.0. Manual attacks included operating system fingerprinting, privilege escalation, disk operating system, banner grabbing, traversal attacks and Microsoft IIS and Apache Web server exploits, among others. More significantly, on the live network, the products were exposed to nearly a thousand unique attackers targeting more than 50 ports, detecting thousands of events coming in from the Internet or from several thousand hosts inside the network. Among the live threats confronted were the Sasser worm and Gator spyware. As expected, all four products did a good job detecting threats. With only one exception, in which one IDS initially failed to identify the Sasser worm, the products successfully alerted the presence of all the manual attacks and live threats they confronted. Although the four proved roughly equal in terms of recognizing attacks, important differences--ranging from ease of setup and management to depth of packet analysis and reporting, but especially the fundamental approach taken in detecting threats--may help dictate which solutions best suits individual networks. INSETS: Attack of the Inhospitable Host;The Early Bird Gets the Worm.