How to use the ThreadFix vulnerability management tool

Open Source Security Tools and Applications

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • VirusTotal: On-demand antivirus service scans malicious files

    When several AV scanners are installed on the same system, they are notorious for stepping all over each other. Fortunately, the resources of more than 30 antivirus scanner engines are just a Web-click away. Contributor Scott Sidel explains. 

  • What kinds of network packet data can be extracted from Snort IDS?

    Snort IDS may be able to track information on received network packets, but network security expert MIke Chapple explains what the intrusion detection system is best used for. 

  • Will new Sulley framework take fuzzing to next level?

    Pedram Amini, head of TippingPoint's security research group, has been busy with Aaron Portnoy, touting a new tool for functional protocol testing (also known as "black-box testing" or "fuzzing,"). He co-wrote the recently-released book "Fuzzing: Bru... 

  • Shining a spotlight on rootkits

    In this tip, contributor Scott Sidel discusses rootkit attacks, and unveils several free software tools that can help to assist security professionals in the rootkit detection process. 

  • Can Snort be configured with a FreeBSD router?

    Just because you can use Snort, it doesn't necessarily mean that you always should. In this expert Q&A, Mike Chapple explains which network configuration scenarios call for the intrusion defense tool and which ones don't. 

  • Sourcefire acquires open source ClamAV

    Sourcefire, maker of the popular Snort open source IDS tool, has acquired ClamAV, an open source email gateway scanning tool. 

  • Fuzzing: Brute Force Vulnerability Discovery

    In this Chapter 21 excerpt from "Fuzzing: Brute Force Vulnerability Discovery," authors Michael Sutton, Adam Greene, and Pedram Amini examine SPIKE, one of the most popular and widely used fuzzing frameworks. 

  • Immunity releases new exploit-writing tool

    Pen testing company Immunity says its Debugger tool offers researchers a new way to write exploits, analyze malware and reverse engineer binary files. 

  • Buy vs. build: Choosing an enterprise intrusion detection system

    When it comes to intrusion detection systems, should you buy or build? In this SearchSecurity.com Q&A, network security expert Mike Chapple explains when an enterprise should use a commercially supported product. 

  • Closing the case on network firewall security with IPCop

    With new threats constantly evolving, the basic network firewall is in dire need of a serious makeover. But finding a firewall that includes a plethora of security features without breaking the budget isn't always easy. In this tip, contributor Scott...