Network Security Toolkit distribution aids network security administrators


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News Network Security Toolkit distribution aids network security administrators
# 1  
Old 07-23-2008
Network Security Toolkit distribution aids network security administrators

07-23-2008 08:00 AM
Network Security Toolkit is one of many live CD Linux distributions focusing on network monitoring, analysis, and security. NST was designed to give network security administrators easy access to a comprehensive set of open source network applications, many of which are among the top 100 security tools recommended by insecure.org.



Source...
Login or Register to Ask a Question

Previous Thread | Next Thread

5 More Discussions You Might Find Interesting

1. Cybersecurity

Network security course

Hi I was wondering if someone could give some tips about network security postgraduate courses and/or certifications . I know that is a generic question and a wide area, but that's the problem, the net is full of books, courses, or whatever. My goal is to find a good course (or book) that... (0 Replies)
Discussion started by: Dedalus
0 Replies

2. UNIX for Advanced & Expert Users

Network Shell Script & Blade Logic & Network Security

I am going to take up a position in Data & Network Security. I would need to write network shell scripts doing the following task: Going to around 2000 servers and findout which groups has access to each servers and which ids are there in each group that has access. I need to implement... (1 Reply)
Discussion started by: pinnacle
1 Replies

3. Shell Programming and Scripting

NIS, Network security

Hi, I am about to take up task of shell scripting in Network Security. Just started on job. But everything looks new NIS etc.. I tried googling to find systematic explanation of network security terms and how to script for that. But was unable to find. Could anyone of you please direct me to... (1 Reply)
Discussion started by: tostay2003
1 Replies

4. Cybersecurity

Network Security

Hi, I'm currently in a Technical Writing class and I decided to do a report on network security. I need a primary source for this and decided that I would poll you fine people on your prefrences in security related software to get said primary source. 1. What webserver would you consider to be... (1 Reply)
Discussion started by: TYLERofDOOM
1 Replies

5. Cybersecurity

Security for network

hi there, i'm wondering what are the good books out there on internet security, PREFERABELY all topics roll into 1 book topics like firewall DES,3DES,SHA,SSL,CHAP,EAP SPAP,PAP,VPN,L2TP,PPTP,IAS,Kerboros,IPsec,PKI,digital signatures/certifcates,Denial of service,RADIUS,RAS,viruses,trojan... (2 Replies)
Discussion started by: happyfish
2 Replies
Login or Register to Ask a Question
secconfig(8)						      System Manager's Manual						      secconfig(8)

NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security) SYNOPSIS
/usr/sbin/sysman secconfig NOTE: The secsetup utility has been replaced by the secconfig graphical interface. DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have loaded the enhanced security subsets. You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot the system. For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and to restrict the setting of the execute bit to root only. For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming, and password controls. When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con- vuser utility to migrate user accounts. While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths differ between base and enhanced security, and thus user account conversions do not succeed without a password change. NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect at the next reboot. FILES
RELATED INFORMATION
acl(4), authcap(4), default(4), convuser(8), Security delim off secconfig(8)