When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Configuration management database - Wikipedia

    en.wikipedia.org/wiki/Configuration_management...

    CMDB implementations often involve federation – the inclusion of data into the CMDB from other sources – such as asset management, in such a way that the source of the data retains control of the data. Federation is usually distinguished from ETL (extract, transform, load) solutions in which data is copied into the CMDB.

  3. Comparison of open-source configuration management software

    en.wikipedia.org/wiki/Comparison_of_open-source...

    Spacewalk is an open source Linux and Solaris systems management solution [buzzword] and is the upstream project for the source of Red Hat Network Satellite. Spacewalk works with RHEL, Fedora, and other RHEL derivative distributions like CentOS, Scientific Linux, etc.

  4. List of digital forensics tools - Wikipedia

    en.wikipedia.org/.../List_of_digital_forensics_tools

    It features packet injection patched Wi-Fi drivers, GPGPU cracking software, and many tools for penetration testing and security assessment. The Pentoo kernel includes grsecurity and PAX hardening and extra patches – with binaries compiled from a hardened toolchain with the latest nightly versions of some tools available. [3]

  5. List of security assessment tools - Wikipedia

    en.wikipedia.org/wiki/List_of_security...

    Kali Linux (formerly BackTrack), a penetration-test-focused Linux distribution based on Debian; Pentoo, a penetration-test-focused Linux distribution based on Gentoo; ParrotOS, a Linux distro focused on penetration testing, forensics, and online anonymity.

  6. Metasploit - Wikipedia

    en.wikipedia.org/wiki/Metasploit

    Metasploit was created by H. D. Moore in 2003 as a portable network tool using Perl.By 2007, the Metasploit Framework had been completely rewritten in Ruby.On October 21, 2009, the Metasploit Project announced [4] that it had been acquired by Rapid7, a security company that provides unified vulnerability management solutions.

  7. BlackArch - Wikipedia

    en.wikipedia.org/wiki/BlackArch

    BlackArch is a penetration testing distribution based on Arch Linux that provides a large number of security tools. It is an open-source distro created specially for penetration testers and security researchers.

  8. List of free and open-source software packages - Wikipedia

    en.wikipedia.org/wiki/List_of_free_and_open...

    This is a list of free and open-source software packages (), computer software licensed under free software licenses and open-source licenses.Software that fits the Free Software Definition may be more appropriately called free software; the GNU project in particular objects to their works being referred to as open-source. [1]

  9. Category:Pentesting software toolkits - Wikipedia

    en.wikipedia.org/wiki/Category:Pentesting...

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Help; Learn to edit; Community portal; Recent changes; Upload file