Search results
Results From The WOW.Com Content Network
Network Security Toolkit (NST) is a Linux-based Live DVD/USB Flash Drive that provides a set of free and open-source computer security and networking tools to perform routine security and networking diagnostic and monitoring tasks.
Koozali SME server (also known as the SME Server, formerly e-smith server and gateway) is a Linux distribution based on Red Hat Enterprise Linux and can act a server-only or server and gateway. Core features include internet services such as HTTP , FTP or email servers and firewall .
Linux Security Modules (LSM) is a framework allowing the Linux kernel to support, without bias, a variety of computer security models.LSM is licensed under the terms of the GNU General Public License and is a standard part of the Linux kernel since Linux 2.6.
Alpine Linux: Active: Linux distribution: x86, x86-64, ARM: Open source: Free: Linux distribution running from a RAM drive. Its original target was small appliances like routers, VPN gateways, or embedded x86 devices. However, it supports hosting other Linux guest OSes under LXC control, making it an attractive hosting solution as well. Uses ...
BackBox is a penetration test and security assessment oriented Ubuntu-based Linux distribution providing a network and informatic systems analysis toolkit. [3] It includes a complete set of tools required for ethical hacking and security testing.
It appears as a block device, which can be used to back file systems, swap or as an LVM physical volume. Some Linux distributions support the use of dm-crypt on the root file system. These distributions use initrd to prompt the user to enter a passphrase at the console, or insert a smart card prior to the normal boot process. [3]
Alternatively, AIDE can be configured to run on a schedule and report changes daily using scheduling technologies such as cron, which is the default behavior of the Debian AIDE package. [ 2 ] This is mainly useful for security purposes, given that any malicious change which could have happened inside the system would be reported by AIDE.
Tiger was originally developed by Douglas Lee Schales, Dave K. Hess, Khalid Warraich, and Dave R. Safford in 1992 at Texas A&M University. [1] [2] The tool was originally developed to provide a check of UNIX systems on the A&M campus that had to be accessed from off campus and, consequently, required clearance through the network security measures set in place.