Cyber Security and Information Infrastructure Protection
Practical measures for critical infrastructure protection, intrusion prevention and threat assessment.
Deception Toolkit
Make your system seem to have network security bugs, and log attack attempts.
FakeBo
Fakes trojan servers (Back Orifice, NetBus) and logs every attempt from client.
Flawfinder
Examines source code looking for security weaknesses.
Guarded Memory Move (GMM)
The GMM library can be used to prevent and study buffer overflows exploits
Samhain
A tool for file integrity checking that optionally can be used as a client/server application for centralized monitoring of networked hosts.
TCP Wrappers and other security tools
Security tools and papers. A website by Wietse Venema.
[Forensic Mozilla]
Last update:
October 2, 2014 at 9:45:07 UTC
Computers
Games
Health
Home
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports
All Languages
Arts
Business