When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Wireshark - Wikipedia

    en.wikipedia.org/wiki/Wireshark

    Wireshark is very similar to tcpdump, but has a graphical front-end and integrated sorting and filtering options.. Wireshark lets the user put network interface controllers into promiscuous mode (if supported by the network interface controller), so they can see all the traffic visible on that interface including unicast traffic not sent to that network interface controller's MAC address.

  3. Ghidra - Wikipedia

    en.wikipedia.org/wiki/Ghidra

    Ghidra (pronounced GEE-druh; [3] / ˈɡiːdrə / [4]) is a free and open source reverse engineering tool developed by the National Security Agency (NSA) of the United States. The binaries were released at RSA Conference in March 2019; the sources were published one month later on GitHub. [5] Ghidra is seen by many security researchers as a ...

  4. M3UA - Wikipedia

    en.wikipedia.org/wiki/M3UA

    M3UA is a communication protocol of the SIGTRAN family, used in telephone networks to carry signaling over Internet Protocol (IP). M3UA enables the SS7 protocol's User Parts (e.g. ISUP, SCCP and TUP) to run over virtually any network technology breaking its limitation to telephony equipment like T-carrier, E-carrier or Asynchronous Transfer Mode (ATM), which highly improves scalability of the ...

  5. Scapy - Wikipedia

    en.wikipedia.org/wiki/Scapy

    Scapy. Cross-platform. Scapy is a packet manipulation tool for computer networks, [4][5] originally written in Python by Philippe Biondi. It can forge or decode packets, send them on the wire, capture them, and match requests and replies. It can also handle tasks like scanning, tracerouting, probing, unit tests, attacks, and network discovery.

  6. Tera Term - Wikipedia

    en.wikipedia.org/wiki/Tera_Term

    Tera Term. Tera Term (alternatively TeraTerm) is an open-source, free, software implemented, terminal emulator (communications) program. It emulates different types of computer terminals, from DEC VT100 to DEC VT382. It supports Telnet, SSH 1 & 2 and serial port connections. It also has a built-in macro scripting language (supporting Oniguruma ...

  7. Protocol analyzer - Wikipedia

    en.wikipedia.org/wiki/Protocol_analyzer

    Protocol analyzer. A protocol analyzer is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel. Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard communication protocol (networked or point-to-point).

  8. List of PDF software - Wikipedia

    en.wikipedia.org/wiki/List_of_PDF_software

    Proprietary software for viewing and editing PDF documents. pdftk: GNU GPL/Proprietary: command-line tools to manipulate, edit and convert documents; supports filling of PDF forms with FDF/XFDF data. PDF-XChange Viewer: Freeware: Freeware PDF reader, tagger, editor (simple editions) and converter (free for non-commercial uses).

  9. Link Layer Discovery Protocol - Wikipedia

    en.wikipedia.org/wiki/Link_Layer_Discovery_Protocol

    The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors on a local area network based on IEEE 802 technology, principally wired Ethernet. [1] The protocol is formally referred to by the IEEE as Station and Media Access Control ...