(Page 9 of 31)   < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >

Category: Network Monitoring

GeneSyS
Added 2004-02-20
by Balazs E. Pataki
GeneSyS aims to define and implement a middleware architecture for generic system monitoring and supervision. It is an Information Society Project (IST-2001-34162) sponsored by the European Commission. It provides a middleware- and agent-based approach for system monitoring and management. It uses WebServices technology (SOAP) for communication between components and XML-based descriptions of monitoring information.

aNTG
Added 2004-02-20
by Lucas
aNTG (another Network Traffic Grapher) is a PHP program that collects and graphs network traffic statistics on a Linux machine.

Nast
Added 2004-02-18
by embyte
Nast is a packet sniffer and a LAN analyzer based on Libnet and Libpcap. It can sniff the packets on a network interface in normal mode or in promiscuous mode. It dumps the headers of packets and the payload in ASCII or ASCII-hex format. Various packet filters can be applied. The data sniffed can be saved in a separate file. As an analysis tool, it can check for other NICs on the network which are set in promiscuous mode, build a list of all hosts on a LAN, find a gate­way, perform port scanning on a multiple hosts, catch daemon banners, follow the TCP data stream, reset a connection, and determine whether a link type is a hub or switch.

linksysmon
Added 2004-02-16
by Mike Wohlgemuth
linksysmon is a tool for monitoring Linksys BEFSR41/BEFSR11 firewalls under Linux and other Unix-like operating systems. It accepts log messages from the Linksys, and logs the messages to /var/log/linksys.log. It handles the standard activity logs, as well as the "secret" extended logging, and can handle logs from multiple firewalls. When using extended logging, it can detect external IP address changes (if you are using either DHCP or PPPOE) and can call an external program to process the change.

NAT Monitor
Added 2004-02-16
by thedayofcondor
NAT Monitor is a graphical monitor to keep tracks of hosts' bandwidth usage in a Linux-NAT local network. NAT Monitor draws a stacked graph with a different color for every LAN host. It autodetects hosts and has a nice summary statistic.

netspeed_applet for gnome
Added 2004-02-09
by joergen scheibengruber
netspeed_applet is a little GNOME applet that shows the traffic on a specified network device (for example eth0) in kbytes/s.

Covert Channels and Tunnels Detection Engine
Added 2004-02-09
by Simon Castro
CCTDE is designed as an analysis back-end for the Snort NIDS tool and focuses on providing a way to register and disclose information leading to the detection of unauthorized tunnels and covert channels.

jPortKnock
Added 2004-02-09
by Mondain
Port knocking describes a method of establishing a connection to a networked computer with no open port. Ports are opened with the use of port knock sequences: a series of connection attempts to a series of closed and logged ports. jPortKnock is an implementation of this method.

Andutteye Surveillance (server)
Added 2004-01-30
by andutt
Andutteye is surveillance software for Linux and Unix systems. Its used to monitor your system, resolve local actions, and send alarms to a central point. You can manage your client configurations, view and handle the incoming alarms, and have FAQ entries on well known alarms.

File Integrity Command & Control
Added 2004-01-30
by Terry Ott
File Integrity Command & Control (FICC) helps system administrators manage multiple Tripwire installations across their network. It maintains MD5 hashes for the three key Tripwire files (the config file, executable, and TW database) for every system it monitors. Using SCP, it retrieves these key files from each system and compares the computed signature against the signatures in the FICC signature database. If all three signatures match the database, FICC then connects to the host via SSH and runs Tripwire. In the event that any of the signatures do not match the database or Tripwire detects files changes, an email is sent to the "FICC administrator" of the system in question.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus