50 Essential Open Source Security Tools
Anti-Everything, Encryption, Secure Delete, ForensicsThe area of open source security software is growing rapidly, with a cornucopia of apps for every use: anti-spam, firewalls, forensics, encryption, log monitoring, passwords – the list is growing even as you read this.
In many cases, these open source security tools – many of which are free – are available for the Windows, Linux and Mac operating systems.
Winner of multiple Datamation Product of the Year awards, SpamAssassin uses header and text analysis, Bayesian filtering, DNS blocklists, and collaborative filtering databases to block unwanted e-mail at the server level. It works with most mail systems and is available under the Apache license. Operating System: OS Independent.
This anti-virus toolkit is designed especially for protecting mail gateways and features a command line scanner, automatic updates, and more. Although the original ClamAV engine works only with Unix-like systems, numerous other projects (both open-source and commercial) have incorporated ClamAV. Operating System: Linux, Unix, BSD.
ClamWin provides a Windows front-end for the ClamAV antivirus toolkit. It features automatic updates, a scanning schedule, Outlook integration, and more. Operating System: Windows.
Developed by the NSA, Security Enhanced Linux adds mandatory access control features to the Linux OS. It enforces complete separation of information to make it more difficult to bypass application security mechanisms. Operating System: Linux, Unix.
Novell's application firewall uses policy-based profiles to control who can access various applications. It's included with openSUSE and SUSE Linux Enterprise, but is also available for download for any Linux system. Operating System: Linux.
Just slip a disk containing Darik's Boot and Nuke into your system, and it will automatically destroy all the data on any hard drive it can detect. It's ideal for cleaning up old computers before they are donated or recycled. Operating System: OS Independent.
Eraser completely eliminates a file so that it cannot be read with digital forensic tools. It overwrites data several times with random patterns erasing all traces of sensitive information. Operating System: Windows.
TruCrypt can create a virtual encrypted disk within a file or encrypt a partition or drive on a Windows system. It can also be used to encrypt a portable hard drive or USB flash drive. Operating System: Windows, Mac, Linux.
Simply right-click any file on Windows Explorer to encrypt it with AxCrypt. AxCrypt aims to make it as easy to work with encrypted files as it is to work with unencrypted files—just a lot more secure. Operating System: Windows.
WinSCP is a easy-to-use, basic SFTP and FTP client for Windows only. It also supports SCP. Operating System: Windows.
11. The Sleuth Kit
Need to recover a deleted file? The Sleuth Kit lets you read deleted data from NTFS, FAT, FFS, and EXT2FS file systems. Operating System: Windows, Mac, Linux, Unix, BSD, Solaris.
Gateway Security Appliance
A great alternative to expensive commercial security appliances, Untangle combines the best of open-source Web filtering, anti-spam, anti-spyware, anti-virus, intrusion prevention, firewall, VPN, and more into one download that can be used to turn any PC into a security appliance. Commercial support and other add-ons are available for a fee. Operating System: Linux.
Similar to Untangle, Endian Firewall Community can turn an old PC into a unified threat management (UTM) appliance that provides a firewall, anti-virus, anti-spam, content filtering, and a VPN. Pre-configured appliances and support are also available for a fee. Operating System: Linux.
- Skip Ahead
- 1. Anti-Everything, Encryption, Secure Delete, Forensics
- 2. Anti-Everything, Encryption, Secure Delete, Forensics
- 3. Anti-Everything, Encryption, Secure Delete, Forensics
- 4. Anti-Everything, Encryption, Secure Delete, Forensics
Solid state disks (SSDs) made a splash in consumer technology, and now the technology has its eyes on the enterprise storage market. Download this eBook to see what SSDs can do for your infrastructure and review the pros and cons of this potentially game-changing storage technology.
- 1Linux Top 3: GNOME 3.12 and New Betas for Ubuntu 14.04 and OpenMandriva Lx 2014.0
- 2Linux Top 3: Linus Lashes out, Linux 3.14 Gets PIE and Ubuntu One is Done.
- 3Linux Top 3: Ubuntu 14.04, Debian Gives Squeeze More Life and Red Hat Goes Atomic
- 4Linux Top 3: CoreOS, Oracle Enterprise Linux 7 and Ubuntu 14.10
- 5Linux Top 3: Debian Gives Up on Upstart, Ubuntu and Linux Kernel Updates