Skip to main content

Directory: A-Z 

Results 621 - 640 of 1235
Klaus Knopper
GPL

KNOPPIX is a bootable CD with a collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a Linux demo, educational CD, rescue syste ...

Akamai Technologies
Commercial

Customisable and Automated Protection Kona Site Defender provides both customizable and automated protection in one solution, while curated rule sets allow you to tailor protection for accuracy. Automated protection extends security across your entire ap ...

Category WAF - Cloud
Kona Site Defender
Redscan
Service

Extensive threat visibilityKroll Responder provides extensive threat visibility across on-premises, cloud and hybrid environments, 24/7. Continual detection of attacksKroll Responder leverages the latest security tools and threat intelligence to ensure y ...

Kroll Responder
Linux
Freeware

L2ping sends a L2CAP echo request to the Bluetooth MAC address bd_addr given in dotted hex notation.

Lan-Secure Company
Commercial

Security Center network access protection software designed to provide real-time network security monitor for intrusion detection IDS and prevention IPS that helps to protect networks from being vulnerable to unauthorized network connections, malicious ne ...

Category IPS Network
Lan-Secure Security Center
Nevis Networks
Commercial

The LANenforcer 2024 and 2124 LAN Security Appliances transparently integrate into existing network infrastructures, sitting between existing switches at the access and distribution layers. The LANenforcer Appliance is an ideal solution for organizations ...

10-Strike Software
Limited Free Trial

10-Strike LANState is a network mapping, monitoring, management, and administration software solution for corporate Microsoft Windows networks. LANState generates the network map, which speeds up accessing to remote hosts' properties and resources, and ma ...

Category Network Mapping
LastPass
Freeware

Save as You Go: Download and setup with LastPass in minutes. Once you've created your account, LastPass prompts you to save new sites as you browse - so you'll never lose another password. Hassle-Free Login: After saving a website's username and passwo ...

LastPass Free

LayerOne is a computer security conference located in Pasadena, California. We are currently in our third year of operation. We are featuring speakers from all across the globe and on topics ranging from lockpicking and MPLS security to covert data gather ...

Blue Ridge Networks, Inc.
Commercial

 LinkGuard prevents external network breaches with a solution that is simple to implement, easy to deploy, and doesn't force your organization to constantly react to cyber threats. Even the most complex systems can be up and running in minutes — with ...

Category VPN Clients
Security University
Commercial

This fast-paced, hands-on class will teach you how to secure UNIX and lock down Linux to protect a system from compromise. You'll learn how the attacks work and how to use hard-core hardening to defeat the bulk of them. You'll learn how to take your machi ...

Open Source
Free

A secure, feature-rich, customizable embedded Linux network appliance for use in a variety of network topologies. Although it can be used in other ways; it's primarily used as a Internet gateway, router, firewall, and wireless access point.

IBM Corporation
Commercial

Learn how to set up and administer a Linux(TM)-based firewall.

IBM Corporation
Commercial

After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to capture, analyze, and generate Internet Protocol (IP) traffic. Then explore the tools and techniques used to exploit protocol we ...

IBM Corporation

This course focuses on network security and makes an excellent companion to: Enterprise Linux Security Administration (QLG55) After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to ca ...

Leading Edge Business Solutions (Pty) Ltd

Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...

Microdev
Commercial

This intermediate course is intended for administrators and support personnel who wish to learn the key skills required to implement security on Linux installations. As more servers on the network move to the Linux operating system, security becomes an in ...

Telco Tech
Commercial

The global connection of company subdivisions and the necessary connection of business partners and mobile employees to the own IT-infrastructure permanently gains importance.

Category VPN Servers
Objective Software Development, GmbH
Commercial

Little Snitch tells you when a program tries to send info to the internet so you can see whats going on in the background! You start an application that tells you that a new version is available. You suddenly realize that with every start this application ...

Little Snitch
Kristinn Gudjonsson
Freeware

log2timeline is a framework for automatic creation of a super timeline. The main purpose is to provide a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produce a timeli ...

Category Forensic Tools