Search results
Results From The WOW.Com Content Network
This is a list of operating systems specifically focused on security.Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.
This is an accepted version of this page This is the latest accepted revision, reviewed on 22 January 2025. List of software distributions using the Linux kernel This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages) This article relies excessively on references to primary sources. Please improve this ...
Network Security Toolkit (NST) is a Linux-based Live DVD/USB Flash Drive that provides a set of free and open-source computer security and networking tools to perform routine security and networking diagnostic and monitoring tasks.
GNU/*/Linux (or Owl for short) is a small security-enhanced Linux distribution for servers, appliances, and virtual appliances. Effectively at end of life. OpenWrt: Active: Linux: x86, x86-64, MIPS, ARM, PowerPC, AVR32, CRIS, m68k, SPARC, SuperH, Ubicom32, etc. GPL V2: Free: Linux distribution with a focus on CPE-routers and
Kali Linux is a Linux distribution designed for digital forensics and penetration testing. [4] It is maintained and funded by Offensive Security . [ 5 ] The software is based on the Debian Testing branch: most packages Kali uses are imported from the Debian repositories . [ 6 ]
Tails, or "The Amnesic Incognito Live System", is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity against surveillance. [5] It connects to the Internet exclusively through the anonymity network Tor. [6]
BlackArch is a penetration testing distribution based on Arch Linux that provides a large number of security tools. It is an open-source distro created specially for penetration testers and security researchers. The repository contains more than 2800 tools that can be installed individually or in groups.
Some distributions like Debian tend to separate tools into different packages – usually stable release, development release, documentation and debug. Also counting the source package number varies. For debian and rpm based entries it is just the base to produce binary packages, so the total number of packages is the number of binary packages.