Cyber Security and Information Infrastructure Protection
Practical measures for critical infrastructure protection, intrusion prevention and threat assessment.
Make your system seem to have network security bugs, and log attack attempts.
Fakes trojan servers (Back Orifice, NetBus) and logs every attempt from client.
Examines source code looking for security weaknesses.
Guarded Memory Move (GMM)
The GMM library can be used to prevent and study buffer overflows exploits
A tool for file integrity checking that optionally can be used as a client/server application for centralized monitoring of networked hosts.
TCP Wrappers and other security tools
Security tools and papers. A website by Wietse Venema.
Last update:October 2, 2014 at 9:45:07 UTC