LogAnalysis.Org
Info aimed at detecting intrusions, but also good general log analysis tips. ... Welcome to LogAnalysis. Log Analysis is one of the great overlooked aspects of ...
http://www.loganalysis.org/
popularity:
security
logging
sysadmin
log
analysis
monitoring
linux
unix
syslog
tools
|
Snare EventLog Agent for Windows - Event Log transfer to Snare & Syslog servers - Open Source
No information avaiable
similarity:
popularity:
windows
syslog
monitoring
logging
opensource
sysadmin
security
software
log
tools
|
Main Page - Fail2ban
Features (List of current and planned features) Screenshots ... Retrieved from "http://www.fail2ban.org/wiki/index.php/Main_Page" Views. Page. Discussion ...
similarity:
popularity:
security
linux
firewall
sysadmin
ssh
iptables
software
apache
tools
server
|
Homepage of ZABBIX :: An Enterprise-Class Open Source Distributed Monitoring Solution
ZABBIX is an enterprise-class open source distributed monitoring solution for networks and applications. ... ZABBIX 1.6: The Ultimate Monitoring Solution ...
similarity:
popularity:
monitoring
network
sysadmin
opensource
linux
software
tools
security
networking
zabbix
|
SecViz | Security Visualization
This is the place to share, discuss, challenge, and learn about security data visualization, log visualization, and IT data visualization.
similarity:
popularity:
security
visualization
tools
analysis
monitoring
graphs
network
blog
graphics
sysadmin
|
Snort - the de facto standard for intrusion detection/prevention
Download for Snort, an open source network intrusion prevention and detection ... Click the rules button for more information on the rulesets available on Snort.org ...
similarity:
popularity:
security
network
opensource
software
linux
tools
ids
snort
networking
sysadmin
|
Darik's Boot and Nuke (Hard Drive Disk Wipe)
Self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, also prevents or thoroughly hinders all known techniques of hard disk forensic analysis.
similarity:
popularity:
security
software
tools
utilities
wipe
utility
erase
linux
sysadmin
computer
|
grsecurity
grsecurity is an innovative approach to security utilizing a multi-layered ... It is licensed under the GPL. It offers among many other features: ...
similarity:
popularity:
security
linux
kernel
software
sysadmin
grsecurity
opensource
rbac
server
unix
|
Samhain Labs
There are many different methods to defend against brute force ssh attacks on ... This paper gives an overview about these different defenses, and outlines their ...
similarity:
popularity:
security
linux
ids
software
sysadmin
opensource
unix
debian
hids
monitoring
|
Nessus
Free, open-source vulnerability and remote security scanner.
similarity:
popularity:
security
network
software
tools
scanner
linux
opensource
networking
vulnerability
sysadmin
|
The Sleuth Kit & Autopsy: Digital Investigation Tools for Linux and other Unixes
sleuthkit.org is the official web site for The Sleuth Kit and Autopsy Browser. ... Copyright © 2003-2010 by Brian Carrier. http://www.sleuthkit.org ...
similarity:
popularity:
forensics
security
linux
tools
recovery
software
opensource
unix
forensic
sysadmin
|