How to use the ThreadFix vulnerability management tool

Open Source Security Tools and Applications

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to configure Snort variables

    Learn how to define Snort's configuration variables. 

  • Where to find Snort IDS rules

    In this tip, JP Vossen points out the four best places to find Snort rules. 

  • Using IDS rules to test Snort

    Here are several methods for testing Snort over the wire to ensure it's working properly in your environment. 

  • Blowfish

    Blowfish is an encryption algorithm that can be used as a replacement for the DES or IDEA algorithms. 

  • Kermit

    Kermit is a popular file transfer and management protocol and suite of communications software programs with advantages over existing Internet protocols such as File Transfer Protocol and Telnet. 

  • Open source: Time to pay up

    If you think open-source products are free, it's time to wise up. 

  • Nessus no longer free

    Developers of the popular open-source tool are starting to charge commercial customers who bring nothing to the project's development. 

  • Network architect: Hardening Linux networks with open source tools, part two

    A network architect gets granular about using a few lesser known OS tools to build a secure infrastructure. 

  • How secure are you?

    A bias-free security testing methodology can help your organization move beyond general best-security practices, to discern exactly how many systems are actually protected. 

  • Is Snort better than a proprietary IDS?

    SearchSecurity's Snort and Network Security Expert JP Vossen answers the age-old questions, Is Snort better than a proprietary IDS? And is it difficult to manage or find support for?