chkrootkit -- locally checks for signs of a r...
chkrootkit locally checks for signs of a rootkit. Includes ifpromisc.c to check if the interface is in promiscuous mode, chklastlog.c and chkwtmp.c to check for ...
http://www.chkrootkit.org/
popularity:
security
linux
rootkit
tools
software
sysadmin
unix
opensource
tool
hacking
|
fwsnort - iptables Intrusion Detection with String Matching and Snort Rules
No information avaiable
similarity:
popularity:
security
firewall
snort
iptables
linux
ids
software
sysadmin
ips
fwsnort
|
SystemTools.com - Windows NT/2000/XP/2003 System Management Software
Maker of DumpAcl, a utility for Windows NT that makes it easy to spot holes in system security.
similarity:
popularity:
security
windows
tools
software
audit
utilities
microsoft
admin
sysadmin
dumpsec
|
Preventing Brute Force Attacks With Fail2ban On Debian Etch | HowtoForge - Linux Howtos and Tutorials
No information avaiable
similarity:
popularity:
security
linux
debian
fail2ban
sysadmin
iptables
tutorial
server
howto
ubuntu
|
Linux Benchmark Suite Homepage
To provide a wide range of both synthetic and application benchmarks for Linux ... Project management tools and mailing lists can be found on the SourceForge site. ...
similarity:
popularity:
linux
benchmark
performance
tools
testing
hardware
unix
kernel
sysadmin
tool
|
Passive Asset Detection System
No information avaiable
similarity:
popularity:
security
network
ids
tools
monitoring
passive
software
networking
opensource
pads
|
ConfigServer Security & Firewall
A Stateful Packet Inspection (SPI) firewall, Login/Intrusion Detection and ... may require custom regex patterns for some functions) Supported and Tested ...
similarity:
popularity:
security
firewall
linux
cpanel
server
csf
whm
sysadmin
web
free
|
WarVOX: Introduction
This model allows WarVOX to find and classify a wide range of interesting lines, ... just those connected to modems, allowing for a comprehensive audit of ...
similarity:
popularity:
security
wardialing
voip
hacking
tools
pentest
phone
infosec
opensource
linux
|
Secure Programming for Linux and Unix HOWTO
This book provides a set of design and implementation guidelines for writing ... Such programs include application programs used as viewers of remote data, web ...
similarity:
popularity:
security
programming
linux
unix
c
howto
secure
development
c++
c\/c++
|
Augeas — Main
Configuration changes are made by manipulating this tree and saving ... A command line tool to manipulate configuration from the shell (and shell scripts) ...
similarity:
popularity:
sysadmin
configuration
linux
management
api
software
unix
redhat
tools
config
|
Endian - 숀ꀀUnified Threat Management, Firewall Appliance, UTM Appliance, Hotspot, Antispam, Antivirus, VPN, OpenVPN, Open Source숀ꀀ
Endian is the leading provider of open source network security solutions. ... Crystal Approach, a Canberra-based consultancy and managed services provider ...
similarity:
popularity:
firewall
linux
security
opensource
software
appliance
proxy
router
distro
endian
|