Search results
Results from the WOW.Com Content Network
Tails, or "The Amnesic Incognito Live System", is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity against surveillance. [5] It connects to the Internet exclusively through the anonymity network Tor. [6]
ZoneMinder is a free, open-source software application for monitoring via closed-circuit television - developed to run under Linux and FreeBSD and released under the terms of the GNU General Public License (GPL). Users control ZoneMinder via a web-based interface.
Network Security Toolkit (NST) is a Linux-based Live DVD/USB Flash Drive that provides a set of free and open-source computer security and networking tools to perform routine security and networking diagnostic and monitoring tasks.
GNU/*/Linux (or Owl for short) is a small security-enhanced Linux distribution for servers, appliances, and virtual appliances. Effectively at end of life. OpenWrt: Active: Linux: x86, x86-64, MIPS, ARM, PowerPC, AVR32, CRIS, m68k, SPARC, SuperH, Ubicom32, etc. GPL V2: Free: Linux distribution with a focus on CPE-routers and
Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) [4] created in 1998 by Martin Roesch, founder and former CTO of Sourcefire. [5] [6] Snort is now developed by Cisco, which purchased Sourcefire in 2013. [7] [8] [9]
Suricata is an open-source based intrusion detection system (IDS) and intrusion prevention system (IPS). It was developed by the Open Information Security Foundation (OISF). A beta version was released in December 2009, with the first standard release following in July 2010. [4] [5]
Teleport is an open-source tool that provides zero trust access to servers and cloud applications using SSH, Kubernetes and HTTPS. [ 2 ] [ 3 ] It can eliminate the need for VPNs by providing a single gateway to access computing infrastructure via SSH, Kubernetes clusters, and cloud applications via a built-in proxy.
OSSEC (Open Source HIDS SECurity) is a free, open-source host-based intrusion detection system (HIDS). It performs log analysis , integrity checking, Windows registry monitoring, rootkit detection, time-based alerting, and active response.