The document discusses advanced persistent threats (APTs) and methods for fighting them using open source tools. It describes the characteristics of APTs and provides examples like the GhostNet and Aurora attacks. It also analyzes the Trojan.Hydraq used in Aurora. The key to fighting APTs is centralizing and correlating security data. Effective countermeasures include log monitoring, integrity monitoring, IDS/IPS, and analyzing suspicious network traffic and files to build a behavior matrix.