When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Comparison of MQTT implementations - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_MQTT...

    MQTT is an ISO standard (ISO/IEC PRF 20922) [1] publish–subscribe-based messaging protocol.It works on top of the Internet protocol suite TCP/IP. It is designed for connections with remote locations where a "small code footprint" is required or the network bandwidth is limited.

  3. Node-RED - Wikipedia

    en.wikipedia.org/wiki/Node-RED

    Node-RED has gained traction in the industrial internet of things (IIoT) and edge computing sectors. [8] [9] [10] Node-RED's open-source nature and large community have led to the creation of over 4000 connectors [11] supporting a wide range of data sources and protocols such as Modbus, OPC-UA, Siemens S7, and MQTT.

  4. MQTT - Wikipedia

    en.wikipedia.org/wiki/MQTT

    MQTT clustering is a technique employed to ensure high availability, fault tolerance, and scalability in MQTT deployments. [27] As an efficient and lightweight messaging protocol, MQTT clustering allows for the creation of a resilient network of interconnected broker nodes, ensuring continuous and reliable message delivery even in the face of ...

  5. BlackArch - Wikipedia

    en.wikipedia.org/wiki/BlackArch

    BlackArch is a penetration testing distribution based on Arch Linux that provides a large number of security tools. It is an open-source distro created specially for penetration testers and security researchers.

  6. List of digital forensics tools - Wikipedia

    en.wikipedia.org/wiki/List_of_digital_forensics...

    Windows, MacOS and Linux: MIT: 2.1.1: Extracts email addresses, URLs, and a variety of binary objects from unstructured data using recursive re-analysis. COFEE: Windows: proprietary: n/a: A suite of tools for Windows developed by Microsoft Digital Forensics Framework: Unix-like/Windows: GPL: 1.3: Framework and user interfaces dedicated to ...

  7. BackBox - Wikipedia

    en.wikipedia.org/wiki/BackBox

    It includes some of the most used security and analysis Linux tools, aiming for a wide spread of goals, ranging from web application analysis to network analysis, from stress tests to sniffing, also including vulnerability assessment, computer forensic analysis and exploitation.

  8. BackTrack - Wikipedia

    en.wikipedia.org/wiki/BackTrack

    BackTrack was a Linux distribution that focused on security, based on the Knoppix Linux distribution aimed at digital forensics and penetration testing use. [4] In March 2013, the Offensive Security team rebuilt BackTrack around the Debian distribution and released it under the name Kali Linux.

  9. BitlBee - Wikipedia

    en.wikipedia.org/wiki/BitlBee

    BitlBee is a cross-platform IRC instant messaging gateway, licensed under the terms of the GNU General Public License.. BitlBee communicates with the user via the IRC protocol, providing a gateway to popular chat networks such as AIM and ICQ (via OSCAR), Microsoft Messenger service (via MSNP), Yahoo!