List Categories and Listings by L

Categories
10-Strike Software
Limited Free Trial
Pricing Model

10-Strike LANState is a network mapping, monitoring, management, and administration software solution for corporate Microsoft Windows networks. LANState generates the network map, which speeds up accessing to remote hosts' properties and resources, and ma ...

Category Network Mapping
Modified
Freeware
Pricing Model

L2ping sends a L2CAP echo request to the Bluetooth MAC address bd_addr given in dotted hex notation.

Modified
Commercial
Pricing Model

The Look'n'Stop personal firewall blocks intrusion threats and makes your PC invisible to anyone on the Internet. Look 'n' Stop Firewall provides key features to protect your computer against cyber threats. It prevents malicious programs from transmittin ...

Modified
Objective Software Development, GmbH
Commercial
Pricing Model

Little Snitch tells you when a program tries to send info to the internet so you can see whats going on in the background! You start an application that tells you that a new version is available. You suddenly realize that with every start this application ...

Modified
Little Snitch
Lucidata Data Communications Consultants
Commercial
Pricing Model

Hackerproof - The LuciGate Firewall is a piece of dedicated hardware (sometimes referred to as a Firewall Appliance) that sits between your network and the outside world. Without its smartcard key, it will not allow ANY data to pass through it. It is not ...

Modified
LuciGate Firewall
Blue Ridge Networks, Inc.
Commercial
Pricing Model

 LinkGuard prevents external network breaches with a solution that is simple to implement, easy to deploy, and doesn't force your organization to constantly react to cyber threats. Even the most complex systems can be up and running in minutes — with ...

Category VPN Clients
Modified
Commercial
Pricing Model

The global connection of company subdivisions and the necessary connection of business partners and mobile employees to the own IT-infrastructure permanently gains importance.

Category VPN Servers
Modified
Lucidata Data Communications Consultants
Commercial
Pricing Model

Hackerproof - The LuciGate Firewall is a piece of dedicated hardware (sometimes referred to as a Firewall Appliance) that sits between your network and the outside world. Without its smartcard key, it will not allow ANY data to pass through it. It is not ...

Modified
Free
Pricing Model

A secure, feature-rich, customizable embedded Linux network appliance for use in a variety of network topologies. Although it can be used in other ways; it's primarily used as a Internet gateway, router, firewall, and wireless access point.

ModifiedNever
tomek@lutel.pl
Freeware
Pricing Model

LutelWall (formerly known as Lutel Firewall) is high-level linux firewall configuration tool. It uses human-readable and easy to understand configuration to set up Netfilter in most secure way. Its flexibility allows firewall admins build from very simple ...

Modified
LutelWall
Nevis Networks
Commercial
Pricing Model

The LANenforcer 2024 and 2124 LAN Security Appliances transparently integrate into existing network infrastructures, sitting between existing switches at the access and distribution layers. The LANenforcer Appliance is an ideal solution for organizations ...

Modified

LayerOne is a computer security conference located in Pasadena, California. We are currently in our third year of operation. We are featuring speakers from all across the globe and on topics ranging from lockpicking and MPLS security to covert data gather ...

ModifiedNever
IBM Corporation
Commercial
Pricing Model

After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to capture, analyze, and generate Internet Protocol (IP) traffic. Then explore the tools and techniques used to exploit protocol we ...

Modified
Commercial
Pricing Model

This intermediate course is intended for administrators and support personnel who wish to learn the key skills required to implement security on Linux installations. As more servers on the network move to the Linux operating system, security becomes an in ...

Modified
Leading Edge Business Solutions (Pty) Ltd

Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...

ModifiedNever
IBM Corporation

This course focuses on network security and makes an excellent companion to: Enterprise Linux Security Administration (QLG55) After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to ca ...

ModifiedNever
Kerry Thompson
Freeware
Pricing Model

Logsurfer is a program for monitoring system logs in real-time, and reporting on the occurrence of events. It is similar to the well-known swatch program on which it is based, but offers a number of advanced features which swatch does not support. Logsur ...

Category Host IDS
Modified
IBM Corporation
Commercial
Pricing Model

Learn how to set up and administer a Linux(TM)-based firewall.

ModifiedNever
Security University
Commercial
Pricing Model

This fast-paced, hands-on class will teach you how to secure UNIX and lock down Linux to protect a system from compromise. You'll learn how the attacks work and how to use hard-core hardening to defeat the bulk of them. You'll learn how to take your machi ...

ModifiedNever
Kristinn Gudjonsson

log2timeline is a framework for automatic creation of a super timeline. The main purpose is to provide a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produce a timeli ...

Category Forensic Tools
ModifiedNever