The Top 75 Open Source Security Apps - page 3
1-16: Anti-Malware, Anti-Spyware, Communication, Data Removal...
Designed for small businesses, IPCop lets you turn an old PC into a network appliance that protects against threats and speeds Web access. It's easy to use, and it works with just about every type of connection from dial-up to leased lines. Operating System: Linux.
Notable for its SSH protection, ShellTer is an iptables-based firewall that supports port forwarding, blacklisting, whitelisting, and more. It's easy to configure, easy to install, and easy to customize. Operating System: Linux.
Like IPCop, Endian Firewall Community contains a complete Linux distribution that can be used to turn any PC into a firewall appliance. It includes antivirus, anti-spam, Web content filtering, and VPN capabilities. Operating System: Linux.
Untangle combines an open-source firewall, router, web filter, spam blocker, intrusion detection system, anti-virus, anti-spyware, anti-spam, VPN, and more into a package that rivals commercial network gateways. In order to use it, you'll need a separate PC that will function as a security appliance. Operating System: Linux.
Like many of the other apps in this category, Devil-Linux was originally intended to be used to turn an old PC into a firewall/router. Now the program has been updated so that it can also be used as an application server. Operating System: Linux.
35. Turtle Firewall
Turtle Firewall is fast and easy-to-use--if you know what you're doing. You define and select which zones, hosts, networks, and services you want to enable, which gives you a lot of control but requires a good understanding of network security. Operating System: Linux.
Shorewall (aka "Shoreline Firewall") makes it easy to configure Netfilter so that it can be used as a firewall on a standalone system or as part of a gateway appliance on a network. Once installed, it can also be used to monitor Netfileter actions. Operating System: Linux.
Like Shorewall, FireHOL isn't an actual firewall as much as a firewall configurator. It aims to make understanding and configuring firewalls easy, even for those with limited knowledge on the subject. Operating System: Linux.
38. Sentry Firewall
Sentry combines firewall, server, and intrusion detection capabilities onto a bootable CD. It relies on a number of well-known open source apps, including Open VPN, Snort IDS, NMap, and more. Operating System: Linux.
Designed to be easy to use, Vuurmuur is an iptables-based firewall that doesn't require any knowledge of iptables. It offers real-time log and connection viewing, filtering, traffic volume accounting, auditing, and more. Operating System: Linux.
Short for "Open Digital Evidence Search and Seizure Architecture," ODESSA contains a number of different tools for collecting and analyzing digital evidence. With more than seven years of development behind it, the project is fairly mature, and the site contains links to a number of other forensics-related projects. Operating System: Windows, Linux, OS X.
41. Live View
Live View creates a virtual machine from a raw disk image or physical disk. As a result, you can see and interact with a PC just as the user did, without changing the environment or endangering your own PC. Operating System: Windows.
Internet Security Suites
Calling itself "an opensource watchdog for Windows," Winpooch incorporates anti-spyware and anti-trojan capabilities with ClamWin Antivirus. It aims to give the user complete control over which programs are running on the system. Operating System: Windows.
The DemocraKey tagline says it all: "It's like a condom for your computer." Install it on a portable drive and plug it in to any computer. DemocraKey scans for viruses and protects your privacy while you surf. Operating System: Windows.
As the most widely deployed intrusion prevention technology in the world, Snort has earned the right to call itself "the de facto standard for intrusion prevention/detection." It performs real-time analysis to detect buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and other attacks. Operating System: Linux, Unix, BSD, Mac OS X.
Short for "Another File Integrity Checker," AFICK monitors changes to your file systems in order to alert you to possible intrusion. If you're familiar with Tripwire, AFICK will look and feel very familiar. Operating System: Windows, Linux, Unix.
This modified version of Snort uses iptables instead of libpcap. Operating System: FreeBSD, Linux.
- Skip Ahead
- 1. 1-16: Anti-Malware, Anti-Spyware, Communication, Data Removal...
- 2. 1-16: Anti-Malware, Anti-Spyware, Communication, Data Removal...
- 3. 1-16: Anti-Malware, Anti-Spyware, Communication, Data Removal...
- 4. 1-16: Anti-Malware, Anti-Spyware, Communication, Data Removal...
- 5. 1-16: Anti-Malware, Anti-Spyware, Communication, Data Removal...
Solid state disks (SSDs) made a splash in consumer technology, and now the technology has its eyes on the enterprise storage market. Download this eBook to see what SSDs can do for your infrastructure and review the pros and cons of this potentially game-changing storage technology.
- 1Linux Top 3: GNOME 3.12 and New Betas for Ubuntu 14.04 and OpenMandriva Lx 2014.0
- 2Linux Top 3: Linus Lashes out, Linux 3.14 Gets PIE and Ubuntu One is Done.
- 3Linux Top 3: Ubuntu 14.04, Debian Gives Squeeze More Life and Red Hat Goes Atomic
- 4Linux Top 3: CoreOS, Oracle Enterprise Linux 7 and Ubuntu 14.10
- 5Linux Top 3: Debian Dumps SPARC, Ubuntu Takes Over Linux 3.13 and the Core Infrastructure Initiative