enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Application-level gateway - Wikipedia

    en.wikipedia.org/wiki/Application-level_gateway

    In order for these protocols to work through NAT or a firewall, either the application has to know about an address/port number combination that allows incoming packets, or the NAT has to monitor the control traffic and open up port mappings (firewall pinholes) dynamically as required. Legitimate application data can thus be passed through the ...

  3. Zeek - Wikipedia

    en.wikipedia.org/wiki/Zeek

    Zeek is a free and open-source software network analysis framework. Vern Paxson began development work on Zeek in 1995 at Lawrence Berkeley National Lab. [3] Zeek is a network security monitor (NSM) but can also be used as a network intrusion detection system (NIDS). [4] The Zeek project releases the software under the BSD license.

  4. Network detection and response - Wikipedia

    en.wikipedia.org/wiki/Network_detection_and_response

    Network detection and response (NDR) refers to a category of network security products that detect abnormal system behaviors by continuously analyzing network traffic. NDR solutions apply behavioral analytics to inspect raw network packets and metadata for both internal (east-west) and external (north-south) network communications.

  5. Wireshark - Wikipedia

    en.wikipedia.org/wiki/Wireshark

    Wireshark is very similar to tcpdump, but has a graphical front-end and integrated sorting and filtering options.. Wireshark lets the user put network interface controllers into promiscuous mode (if supported by the network interface controller), so they can see all the traffic visible on that interface including unicast traffic not sent to that network interface controller's MAC address.

  6. Cacti (software) - Wikipedia

    en.wikipedia.org/wiki/Cacti_(software)

    A common usage is to monitor network traffic by polling a network switch or router interface via Simple Network Management Protocol (SNMP). The Cacti end user front end supports both User and User Groups security models and supports Role Based Access Control (RBAC) for access to not only monitoring data, but various areas of the user interface.

  7. List of free and open-source software packages - Wikipedia

    en.wikipedia.org/wiki/List_of_free_and_open...

    Orbot (Android, iOS) – free proxy app that provides anonymity on the Internet for users of the Android and iOS operating systems. It allows traffic from apps such as web browsers, email clients, map programs, and others to be routed via the Tor network. Organic Maps (Android, iOS) OsmAnd (Android) Quicksy (Android) Stellarium (Android, iOS)

  8. Iftop - Wikipedia

    en.wikipedia.org/wiki/Iftop

    A feature of iftop is that it can suppress display of DNS traffic by using a filter code such as "not port domain", or switch it off entirely, by using the -n option or by pressing "n" when the program is running. Using the -F option makes it possible to show packets entering and leaving a given network.

  9. OmniPeek - Wikipedia

    en.wikipedia.org/wiki/OmniPeek

    PlaceMap: is a freely available standalone Google Maps Packet sniffer application for Windows that captures network traffic and maps nodes to the Google Map. PlaceMap is a notable example of extensibility in that it uses exactly the same Google Map plugin that is also available for the Omnipeek, and it uses the peek driver API to capture packets.