enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Network Security Toolkit - Wikipedia

    en.wikipedia.org/wiki/Network_Security_Toolkit

    Network Security Toolkit (NST) is a Linux-based Live DVD/USB Flash Drive that provides a set of free and open-source computer security and networking tools to perform routine security and networking diagnostic and monitoring tasks.

  3. Argus – Audit Record Generation and Utilization System

    en.wikipedia.org/wiki/Argus_–_Audit_Record...

    Argus is a Top 100 Internet Security Tool, and has been on the list for over 15 years (maybe longer). [ 2 ] Argus is designed to be a real-time situational awareness system, and its data can be used to track, alarm and alert on wire-line network conditions at up to 400Gbit/s.

  4. Tiger (security software) - Wikipedia

    en.wikipedia.org/wiki/Tiger_(security_software)

    Tiger was originally developed by Douglas Lee Schales, Dave K. Hess, Khalid Warraich, and Dave R. Safford in 1992 at Texas A&M University. [1] [2] The tool was originally developed to provide a check of UNIX systems on the A&M campus that had to be accessed from off campus and, consequently, required clearance through the network security measures set in place.

  5. Hard link - Wikipedia

    en.wikipedia.org/wiki/Hard_link

    In computing, a hard link is a directory entry (in a directory-based file system) that associates a name with a file.Thus, each file must have at least one hard link. Creating additional hard links for a file makes the contents of that file accessible via additional paths (i.e., via different names or in different directori

  6. Trusted Execution Technology - Wikipedia

    en.wikipedia.org/wiki/Trusted_Execution_Technology

    Intel Trusted Execution Technology (Intel TXT, formerly known as LaGrande Technology) is a computer hardware technology of which the primary goals are: Attestation of the authenticity of a platform and its operating system. Assuring that an authentic operating system starts in a trusted environment, which can then be considered trusted.

  7. Zeek - Wikipedia

    en.wikipedia.org/wiki/Zeek

    Zeek is a free and open-source software network analysis framework. Vern Paxson began development work on Zeek in 1995 at Lawrence Berkeley National Lab. [3] Zeek is a network security monitor (NSM) but can also be used as a network intrusion detection system (NIDS). [4] The Zeek project releases the software under the BSD license.

  8. NTFS links - Wikipedia

    en.wikipedia.org/wiki/NTFS_links

    Its hardlink sub-command can make hard links or list hard links associated with a file. [9] Another sub-command, reparsepoint, can query or delete reparse points, the file system objects that make up junction points, hard links, and symbolic links. [10] In addition, the following utilities can create NTFS links, even though they don't come with ...

  9. EtherApe - Wikipedia

    en.wikipedia.org/wiki/Etherape

    EtherApe requires root privileges to capture packets (but not to replay captured files). Starting with release 0.9.15 capturing is delegated to a separate process, while the main interface can run with lower privileges, significantly reducing the risk associated with capturing packets from untrusted sources (e.g. Internet).