Free tool reduces risk posed by lost, stolen devices

Open Source Security Tools and Applications

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Cross-build injection attacks: Keeping an eye on Web applications' open source components

    Web application developers' growing dependence on open source components has opened the door for attackers to insert malicious code into applications even as they are being built. Michael Cobb explores the emerging attack method called cross-build in... 

  • FreeRADIUS: Acing a secure connection

    Authentication, authorization and accounting are all essential components of achieving secure access to network resources, and according to contributor Scott Sidel, there is a tool available that can not only provide corporations with all three of th... 

  • Getting the best bargain on network vulnerability scanning

    When it comes to enterprise network analysis, is it best to use a costly commercial vulnerability scanner or a less expensive open source product? In this week's tip, Mike Chapple explains which enterprise assets require the expensive stuff and which... 

  • Screencast: Snort -- Tactics for basic network analysis

    In this exclusive screencast step-by-step demo, Tom Bowers explains how the Snort open source IDS tool works and illustrates how it can help security pros assess network security. 

  • Spiceworks: Free network monitoring and management with a little zest

    Contributor Scott Sidel discusses Spiceworks, an open-source security tool that is designed to assist administrators in the task of maintaining and monitoring enterprise security networks. 

  • VirusTotal: On-demand antivirus service scans malicious files

    When several AV scanners are installed on the same system, they are notorious for stepping all over each other. Fortunately, the resources of more than 30 antivirus scanner engines are just a Web-click away. Contributor Scott Sidel explains. 

  • What kinds of network packet data can be extracted from Snort IDS?

    Snort IDS may be able to track information on received network packets, but network security expert MIke Chapple explains what the intrusion detection system is best used for. 

  • Will new Sulley framework take fuzzing to next level?

    Pedram Amini, head of TippingPoint's security research group, has been busy with Aaron Portnoy, touting a new tool for functional protocol testing (also known as "black-box testing" or "fuzzing,"). He co-wrote the recently-released book "Fuzzing: Bru... 

  • Shining a spotlight on rootkits

    In this tip, contributor Scott Sidel discusses rootkit attacks, and unveils several free software tools that can help to assist security professionals in the rootkit detection process. 

  • Can Snort be configured with a FreeBSD router?

    Just because you can use Snort, it doesn't necessarily mean that you always should. In this expert Q&A, Mike Chapple explains which network configuration scenarios call for the intrusion defense tool and which ones don't.