Skip to main content

List Categories and Listings by L

10-Strike Software

10-Strike LANState is a network mapping, monitoring, management, and administration software solution for corporate Microsoft Windows networks. LANState generates the network map, which speeds up accessing to remote hosts' properties and resources, and ma ...

Category Network Mapping

L2ping sends a L2CAP echo request to the Bluetooth MAC address bd_addr given in dotted hex notation.

The Look'n'Stop personal firewall blocks intrusion threats and makes your PC invisible to anyone on the Internet. Look 'n' Stop Firewall provides key features to protect your computer against cyber threats. It prevents malicious programs from transmittin ...

Objective Software Development, GmbH

Little Snitch tells you when a program tries to send info to the internet so you can see whats going on in the background! You start an application that tells you that a new version is available. You suddenly realize that with every start this application ...

Little Snitch
Lucidata Data Communications Consultants

Hackerproof - The LuciGate Firewall is a piece of dedicated hardware (sometimes referred to as a Firewall Appliance) that sits between your network and the outside world. Without its smartcard key, it will not allow ANY data to pass through it. It is not ...

LuciGate Firewall
Blue Ridge Networks, Inc.

 LinkGuard prevents external network breaches with a solution that is simple to implement, easy to deploy, and doesn't force your organization to constantly react to cyber threats. Even the most complex systems can be up and running in minutes — with ...

Category VPN Clients

The global connection of company subdivisions and the necessary connection of business partners and mobile employees to the own IT-infrastructure permanently gains importance.

Category VPN Servers
Lucidata Data Communications Consultants

Hackerproof - The LuciGate Firewall is a piece of dedicated hardware (sometimes referred to as a Firewall Appliance) that sits between your network and the outside world. Without its smartcard key, it will not allow ANY data to pass through it. It is not ...

A secure, feature-rich, customizable embedded Linux network appliance for use in a variety of network topologies. Although it can be used in other ways; it's primarily used as a Internet gateway, router, firewall, and wireless access point.

tomek@lutel.pl

LutelWall (formerly known as Lutel Firewall) is high-level linux firewall configuration tool. It uses human-readable and easy to understand configuration to set up Netfilter in most secure way. Its flexibility allows firewall admins build from very simple ...

LutelWall
Nevis Networks

The LANenforcer 2024 and 2124 LAN Security Appliances transparently integrate into existing network infrastructures, sitting between existing switches at the access and distribution layers. The LANenforcer Appliance is an ideal solution for organizations ...

LayerOne is a computer security conference located in Pasadena, California. We are currently in our third year of operation. We are featuring speakers from all across the globe and on topics ranging from lockpicking and MPLS security to covert data gather ...

IBM Corporation

After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to capture, analyze, and generate Internet Protocol (IP) traffic. Then explore the tools and techniques used to exploit protocol we ...

This intermediate course is intended for administrators and support personnel who wish to learn the key skills required to implement security on Linux installations. As more servers on the network move to the Linux operating system, security becomes an in ...

Leading Edge Business Solutions (Pty) Ltd

Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...

IBM Corporation

This course focuses on network security and makes an excellent companion to: Enterprise Linux Security Administration (QLG55) After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to ca ...

Kerry Thompson

Logsurfer is a program for monitoring system logs in real-time, and reporting on the occurrence of events. It is similar to the well-known swatch program on which it is based, but offers a number of advanced features which swatch does not support. Logsur ...

Category Host IDS
IBM Corporation

Learn how to set up and administer a Linux(TM)-based firewall.

Security University

This fast-paced, hands-on class will teach you how to secure UNIX and lock down Linux to protect a system from compromise. You'll learn how the attacks work and how to use hard-core hardening to defeat the bulk of them. You'll learn how to take your machi ...

Kristinn Gudjonsson

log2timeline is a framework for automatic creation of a super timeline. The main purpose is to provide a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produce a timeli ...

Category Forensic Tools