Free tool reduces risk posed by lost, stolen devices

Open Source Security Tools and Applications

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Maltego demo: Identifying a website's trust relationships

    This month, Peter Giannoulis of and demonstrates Maltego, an information-gathering tool that infosec pros can use to assist with vulnerability assessments and penetration tests by identifying trust relationships o... 

  • How to use (almost) free tools to find sensitive data

    No matter how much security awareness training employees get, some of them will still store sensitive data in insecure places. As a security manager, finding that data becomes of paramount importance -- but how to do it? In this tip, John Soltys offe... 

  • Writing Wireshark network traffic filters

    The freely available Wireshark tool can provide valuable analysis of network traffic, but capturing packets can often lead to an overload of data. Mike Chapple explains how to use Wireshark's traffic filters to zero in on the precise information that... 

  • FISMA compliance made easier with OpenFISMA

    Scott Sidel examines the open source security tool OpenFISMA, a compliance tool that assists government agencies and their contractors in meeting FISMA's requirements. 

  • Wireshark tutorial: How to sniff network traffic

    One of today's most popular network security analysis tools is Wireshark. The freely available analyzer can inspect traffic, identify denial-of-service attacks and troubleshoot devices and firewalls. In this new tutorial, Wireshark whiz Mike Chapple ... 

  • Screencast: How to use Nipper to create network security reports

    Peter Giannoulis of The demonstrates how to use Nipper, a free open source network infrastructure parser tool. 

  • Using Nessus Attack Scripting Language (NASL) to find application vulnerabilities

    For anyone who doesn't speak NASL, network security expert Mike Chapple has a firm handle on the Nessus Attack Scripting Language. In this brand-new addition to our Nessus 3 Tutorial, Chapple provides examples of NASL scripts that can find known vul... 

  • Nessus: Vulnerability scanning in the enterprise

    General advice for vulnerability scanning in the enterprise with the open source vulnerability scanner Nessus. 

  • How to install and configure Nessus

    Nessus, an open source vulnerability scanner, can scan a network for potential security risks and provide detailed reporting that enables you to remediate gaps in your corporation's security posture. This tip, the first in a series of three on Nessus... 

  • How to run a Nessus system scan

    In the second tip in our series on running Nessus in the enterprise, our contributor takes you step-by-step through the process of running a Nessus system scan. View screenshots of the Nessus interface and learn commands for the Unix Nessus GUI.