Search results
Results From The WOW.Com Content Network
Network Security Toolkit (NST) is a Linux-based Live DVD/USB Flash Drive that provides a set of free and open-source computer security and networking tools to perform routine security and networking diagnostic and monitoring tasks.
Lynis is an extensible security audit tool for computer systems running Linux, FreeBSD, macOS, OpenBSD, Solaris, and other Unix derivatives.It assists system administrators and security professionals with scanning a system and its security defenses, with the final goal being system hardening.
Alpine Linux: Active: Linux distribution: x86, x86-64, ARM: Open source: Free: Linux distribution running from a RAM drive. Its original target was small appliances like routers, VPN gateways, or embedded x86 devices. However, it supports hosting other Linux guest OSes under LXC control, making it an attractive hosting solution as well. Uses ...
Linux Security Modules (LSM) is a framework allowing the Linux kernel to support, without bias, a variety of computer security models.LSM is licensed under the terms of the GNU General Public License and is a standard part of the Linux kernel since Linux 2.6.
BackBox is a penetration test and security assessment oriented Ubuntu-based Linux distribution providing a network and informatic systems analysis toolkit. [3] It includes a complete set of tools required for ethical hacking and security testing.
Enterprise Agents are available for Linux, macOS, Windows, Solaris, Microsoft SQL Server, a variety of browsers, and more. Snare Enterprise Epilog for Windows facilitates the central collection and processing of Windows text-based log files such as ISA/IIS. Snare Enterprise Epilog for Unix provides a method to collect any text based log files ...
This "snapshot" is used to build a database that is saved and may be stored on an external device for safekeeping. When the administrator wants to run an integrity test, the administrator places the previously built database in an accessible place and commands AIDE to compare the database against the real status of the system.
Tiger was originally developed by Douglas Lee Schales, Dave K. Hess, Khalid Warraich, and Dave R. Safford in 1992 at Texas A&M University. [1] [2] The tool was originally developed to provide a check of UNIX systems on the A&M campus that had to be accessed from off campus and, consequently, required clearance through the network security measures set in place.