When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Network Security Toolkit - Wikipedia

    en.wikipedia.org/wiki/Network_Security_Toolkit

    Network Security Toolkit (NST) is a Linux-based Live DVD/USB Flash Drive that provides a set of free and open-source computer security and networking tools to perform routine security and networking diagnostic and monitoring tasks.

  3. Linux Security Modules - Wikipedia

    en.wikipedia.org/wiki/Linux_Security_Modules

    Linux Security Modules (LSM) is a framework allowing the Linux kernel to support, without bias, a variety of computer security models.LSM is licensed under the terms of the GNU General Public License and is a standard part of the Linux kernel since Linux 2.6.

  4. BackBox - Wikipedia

    en.wikipedia.org/wiki/BackBox

    BackBox is a penetration test and security assessment oriented Ubuntu-based Linux distribution providing a network and informatic systems analysis toolkit. [3] It includes a complete set of tools required for ethical hacking and security testing.

  5. Device mapper - Wikipedia

    en.wikipedia.org/wiki/Device_mapper

    The device mapper is a framework provided by the Linux kernel for mapping physical block devices onto higher-level virtual block devices. It forms the foundation of the logical volume manager (LVM), software RAIDs and dm-crypt disk encryption, and offers additional features such as file system snapshots .

  6. Snare (software) - Wikipedia

    en.wikipedia.org/wiki/Snare_(software)

    Enterprise Agents are available for Linux, macOS, Windows, Solaris, Microsoft SQL Server, a variety of browsers, and more. Snare Enterprise Epilog for Windows facilitates the central collection and processing of Windows text-based log files such as ISA/IIS. Snare Enterprise Epilog for Unix provides a method to collect any text based log files ...

  7. Tiger (security software) - Wikipedia

    en.wikipedia.org/wiki/Tiger_(security_software)

    Tiger was originally developed by Douglas Lee Schales, Dave K. Hess, Khalid Warraich, and Dave R. Safford in 1992 at Texas A&M University. [1] [2] The tool was originally developed to provide a check of UNIX systems on the A&M campus that had to be accessed from off campus and, consequently, required clearance through the network security measures set in place.

  8. Smack (software) - Wikipedia

    en.wikipedia.org/wiki/Smack_(software)

    Smack consists of three components: A kernel module that is implemented as a Linux Security Module.It works best with file systems that support extended attributes.; A startup script that ensures that device files have the correct Smack attributes and loads the Smack configuration.

  9. System Security Services Daemon - Wikipedia

    en.wikipedia.org/wiki/System_Security_Services...

    The System Security Services Daemon (SSSD) is software originally developed for the Linux operating system (OS) that provides a set of daemons to manage access to remote directory services and authentication mechanisms. [1] The beginnings of SSSD lie in the open-source software project FreeIPA (Identity, Policy and Audit). [2]