Trinux: A Linux Security Toolkit
Trinux is a ramdisk-based Linux distribution that boots from a single floppy or CD-ROM, loads it packages from an HTTP/FTP server, a FAT/NTFS/ISO filesystem, or additional floppies. Trinux contains the latest versions of popular Open Source network security tools for port scanning, packet sniffing, vulnerability scanning, sniffer detection, packet construction, active/passive OS fingerprinting, network monitoring, session-hijacking, backup/recovery, computer forensics, intrusion detection, and more. Trinux also provides support for Perl, PHP, and Python scripting languages. Remote Trinux boxes can be managed securely with OpenSSH.
Wednesday, March 27, 2002
Open Source Security Tools
• Host Security Scanners
• Intrusion Detection
• VPN Tools
• Reporting Tools
• Secure Applications
• Host Security Scanners
• Intrusion Detection
• VPN Tools
• Reporting Tools
• Secure Applications
Analyzer Switch
The Net Optics' Analyzer Switch / Matrix Switch maximizes your monitoring effectivness while minimizing incremental spending. The passive, 1xN SpyderSwitch enables a single protocol analyzer to perform real-time monitoring and analysis on your choice of up to 32 networks.
The Net Optics' Analyzer Switch / Matrix Switch maximizes your monitoring effectivness while minimizing incremental spending. The passive, 1xN SpyderSwitch enables a single protocol analyzer to perform real-time monitoring and analysis on your choice of up to 32 networks.
Monday, March 25, 2002
TCPDUMP public repository
This page was started to collect various patches that have been floating around for LBL's tcpdump and libpcap programs, and to continue the work needed on both projects.
This page was started to collect various patches that have been floating around for LBL's tcpdump and libpcap programs, and to continue the work needed on both projects.
lcrzoex
lcrzo is a toolbox containing over 300 functionnalities to test an Ethernet/IP network (sniff, spoof, configuration, clients, servers, etc.).
lcrzo is a toolbox containing over 300 functionnalities to test an Ethernet/IP network (sniff, spoof, configuration, clients, servers, etc.).
USERS NOTICE
To be used on your workstations and servers:
------
This computer system is for authorized use only. Users (authorized or unauthorized) have no explicit or implicit expectation of privacy. Any or all uses of this system and all files on this system may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to authorized site and law enforcement personnel. By using this system, the user consents to such interception, monitoring, recording, copying, auditing, inspection, and disclosure at the discretion of authorized site personnel. Unauthorized or improper use of this system may result in administrative disciplinary action or civil or criminal penalties. By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning.
------
To be used on your workstations and servers:
------
This computer system is for authorized use only. Users (authorized or unauthorized) have no explicit or implicit expectation of privacy. Any or all uses of this system and all files on this system may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to authorized site and law enforcement personnel. By using this system, the user consents to such interception, monitoring, recording, copying, auditing, inspection, and disclosure at the discretion of authorized site personnel. Unauthorized or improper use of this system may result in administrative disciplinary action or civil or criminal penalties. By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning.
------
Responding to Problems
CIO worked with the Secret Service, the FBI and industry leaders to create guidelines for reporting security incidents — what to report, who to report it to, and how.
CIO worked with the Secret Service, the FBI and industry leaders to create guidelines for reporting security incidents — what to report, who to report it to, and how.
Information Security Congress at UniNet - InfoSec 2002
As a way to share with the community valuable information, UniNet, the Virtual Network of Telematic Resources, is glad to present, THE INFORMATION SECURITY CONGRESS AT UNINET from April 15th to 19th.
As a way to share with the community valuable information, UniNet, the Virtual Network of Telematic Resources, is glad to present, THE INFORMATION SECURITY CONGRESS AT UNINET from April 15th to 19th.
Subscribe to:
Posts (Atom)