Access "Ping: Fyodor"
This article is part of the December 2007/January 2008 issue of Reflections on the impact of Sarbanes-Oxley
Information Security isn't the only standby celebrating its 10th birthday. Nmap, the popular open source security scanner and network mapping tool, hit double digits in 2007 as well. Like so many projects of its kind, Nmap was a labor of love--and necessity--according to its creator, hacker Fyodor. FYODOR What inspired you to write Nmap, and what were your early expectations? Nmap was mostly written during the summer of 1997, which I spent in Baltimore working as a teaching assistant at Johns Hopkins University. They set me up in a dorm room with Ethernet connectivity, giving me a new network to explore. At the time, I had a directory full of port scanners, such as Strobe for connect scanning, Reflscan for SYN scanning, and the UDP scanner from SATAN. I hacked them all to add options and features, but still found them frustrating to use. So I decided to write my own dream port scanner which would be faster, and support all the scan types and options I wanted. After months of work and testing, Nmap replaced my other port scanners. At first I kept it to myself... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Blow Out the Candles
Information Security magazine turns 10 years old, maturing right alongside the security industry.
-
Milestones
Getting the Point | Turning Points | Nefarious Numbers | SOX Appeal | Evolution of a Hacker | Digital Pickpockets | The Toughest Battle: 10 Years, 10 Attacks | We Hardly Knew Ye
-
Reflections
A Dynamic Decade | News of the Day | Trustworthy Finally? | Crystal Ball
-
Blow Out the Candles
-
Columns
-
Ping: Fyodor
Fyodor
-
Editor's Desk: Risk is the new black
A New Direction for Risk?
-
Ping: Fyodor
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO