When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Koozali SME Server - Wikipedia

    en.wikipedia.org/wiki/Koozali_SME_Server

    Koozali SME server (also known as the SME Server, formerly e-smith server and gateway) is a Linux distribution based on Red Hat Enterprise Linux and can act a server-only or server and gateway. Core features include internet services such as HTTP , FTP or email servers and firewall .

  3. Network Security Toolkit - Wikipedia

    en.wikipedia.org/wiki/Network_Security_Toolkit

    Network Security Toolkit (NST) is a Linux-based Live DVD/USB Flash Drive that provides a set of free and open-source computer security and networking tools to perform routine security and networking diagnostic and monitoring tasks.

  4. Advanced Intrusion Detection Environment - Wikipedia

    en.wikipedia.org/wiki/Advanced_Intrusion...

    This "snapshot" is used to build a database that is saved and may be stored on an external device for safekeeping. When the administrator wants to run an integrity test, the administrator places the previously built database in an accessible place and commands AIDE to compare the database against the real status of the system.

  5. Linux Malware Detect - Wikipedia

    en.wikipedia.org/wiki/Linux_Malware_Detect

    To protect Linux systems against vulnerabilities, various software packages are available, such as rootkit detectors such as Rootkit Hunter and chkrootkit, and auditing systems like lynis. Malware detection software such as LMD and ClamAV improve the security of systems by scanning them based on the signatures of thousands of instances of known ...

  6. Snare (software) - Wikipedia

    en.wikipedia.org/wiki/Snare_(software)

    The Snare agents have been designed to collect audit log data from a host system, and push the data as quickly as possible, to a central server (or servers), for archive, analysis, and reporting. The central server can be either a syslog server, a Snare Server appliance, or a custom application.

  7. Tiger (security software) - Wikipedia

    en.wikipedia.org/wiki/Tiger_(security_software)

    Tiger was originally developed by Douglas Lee Schales, Dave K. Hess, Khalid Warraich, and Dave R. Safford in 1992 at Texas A&M University. [1] [2] The tool was originally developed to provide a check of UNIX systems on the A&M campus that had to be accessed from off campus and, consequently, required clearance through the network security measures set in place.

  8. Linux Security Modules - Wikipedia

    en.wikipedia.org/wiki/Linux_Security_Modules

    Linux Security Modules (LSM) is a framework allowing the Linux kernel to support, without bias, a variety of computer security models.LSM is licensed under the terms of the GNU General Public License and is a standard part of the Linux kernel since Linux 2.6.

  9. Smack (software) - Wikipedia

    en.wikipedia.org/wiki/Smack_(software)

    Smack consists of three components: A kernel module that is implemented as a Linux Security Module.It works best with file systems that support extended attributes.; A startup script that ensures that device files have the correct Smack attributes and loads the Smack configuration.