When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. List of performance analysis tools - Wikipedia

    en.wikipedia.org/wiki/List_of_performance...

    Linux Requires patched kernel Collects data on processes blocking, context switches, and execution time. This helps identify performance problems over multiple processes or threads. Superseded by LTTng. GPL LTTng (Linux Trace Toolkit Next Generation) Linux System software package for correlated tracing of kernel, applications and libraries.

  3. SPIN model checker - Wikipedia

    en.wikipedia.org/wiki/SPIN_model_checker

    SPIN is a general tool for verifying the correctness of concurrent software models in a rigorous and mostly automated fashion. It was written by Gerard J. Holzmann and others in the original Unix group of the Computing Sciences Research Center at Bell Labs, beginning in 1980.

  4. Valgrind - Wikipedia

    en.wikipedia.org/wiki/Valgrind

    Valgrind (/ ˈ v æ l ɡ r ɪ n d /) [6] is a programming tool for memory debugging, memory leak detection, and profiling.. Valgrind was originally designed to be a freely licensed memory debugging tool for Linux on x86, but has since evolved to become a generic framework for creating dynamic analysis tools such as checkers and profilers.

  5. Linux Malware Detect - Wikipedia

    en.wikipedia.org/wiki/Linux_Malware_Detect

    To protect Linux systems against vulnerabilities, various software packages are available, such as rootkit detectors such as Rootkit Hunter and chkrootkit, and auditing systems like lynis. Malware detection software such as LMD and ClamAV improve the security of systems by scanning them based on the signatures of thousands of instances of known ...

  6. perf (Linux) - Wikipedia

    en.wikipedia.org/wiki/Perf_(Linux)

    The perf subsystem of Linux kernels from 2.6.37 up to 3.8.8 and RHEL6 kernel 2.6.32 contained a security vulnerability (CVE-2013-2094), which was exploited to gain root privileges by a local user. [ 17 ] [ 18 ] The problem was due to an incorrect type being used (32-bit int instead of 64-bit) in the event_id verification code path.

  7. Snort (software) - Wikipedia

    en.wikipedia.org/wiki/Snort_(software)

    The program can also be used to detect probes or attacks, including, but not limited to, operating system fingerprinting attempts, semantic URL attacks, buffer overflows, server message block probes, and stealth port scans. [11] Snort can be configured in three main modes: 1. sniffer, 2. packet logger, and 3. network intrusion detection. [12]

  8. PMD (software) - Wikipedia

    en.wikipedia.org/wiki/PMD_(software)

    PMD includes built-in rule sets and supports the ability to write custom rules. PMD does not report compilation errors, as it only can process well-formed source files. Rather, PMD is designed to detect inefficient code or bad programming habits, which can reduce the performance and maintainability of the program if they accumulate.

  9. lm_sensors - Wikipedia

    en.wikipedia.org/wiki/Lm_sensors

    lm_sensors (Linux-monitoring sensors) is a free open-source software-tool for Linux that provides tools and drivers for monitoring temperatures, voltage, humidity, and fans. It can also detect chassis intrusions. [citation needed]