|
|
Details: |
|
|
Open-source GPL rootkit scanner for Unix-like systems. Scans for rootkits, trojans, backdoors and local exploits. Tests include scanning of plaintext and binary files for MD5 hash comparisons, default rootkit files, binary permissions, suspect LKM/KLD module strings, and hidden files.
|
URL: |
http://www.rootkit.nl/
|
Title: |
Rootkit.nl - Protect your machine |
Image: |
|
Description: |
Computers, Security, Intrusion Detection Systems, Products and Tools - Rootkit Hunter. Open-source GPL rootkit scanner for Unix-like systems. |
Similar: |
|
|
|
Related Sites |
|
EventTracker (Popularity: ): A proactive enterprise-class tool to centrally monitor, analyze and manage events being emitted by Windows NT/2K/XP/2003, UNIX systems and SNMP-enabled ...
sLink project (Popularity: ): sLink consists of a daemon and a suite of cgi programs which provide a web administration interface to an EDM/BOSCH ...
TruSecure Corporation (Popularity: ): Risk mitigation for complex and interconnected business environments. Provider of managed security, risk reduction, and software solutions to prevent network ...
QuIDScor IDS/VA correlation (Popularity: ): QuIDScor is an Open Source project demonstrating the value in correlating information between Intrusion Detection Systems (such as Snort) and ...
LAk Intrusion Prevention System (Popularity: ): A single compilation of source, binaries, scripts and whitepapers on intrusion prevention systems. The aim is to quickly establish a ...
Panoptis (Popularity: ): Network-IDS that detects and stops DoS/DDoS attacks by using real-time Cisco NetFlow data.
Activeworx, Inc. (Popularity: ): Manufacturer of Activeworx Security Center, a feature-rich security event management solution to handle enterprise network events. A centralized and distributed ...
Chkrootkit (Popularity: ): Provides open source application to check for presence of rootkits installed on Linux/Unix machines. Links to security related sites.
myNetWatchman.com (Popularity: ): Intrusion Reporting and Response. Users forward firewall logs that are aggregated and analysed to identify incidents that are reported to ...
DigiStamp: e-TimeStamp Secure Time Stamps (Popularity: ): Commercial time-stamping service that provides intellectual property witnessing and document authentication for any file on a system. Service intends to ...
An Introduction to Intrusion Detection Systems (Popularity: ): Detailed introductory guide to intrusion detection systems, both host and network-based. The Dragon IDS Suite is used to demonstrate usage ...
|
|
Popular Sites |
|
Tripwire, Inc (Popularity: ): Data integrity system that detects unauthorized changes to data on servers and routers and sends notifications. Immediate remediation of altered ...
TriGeo Network Security, Inc. (Popularity: ): TriGeo Network Security, Inc., is a software development and services firm providing network security services and an overlay software solution ...
Wireless LAN Monitoring & Intrusion Protection Software (Popularity: ): WiMetrics' solutions provide a real-time view of all 802.11 wireless device activity on the wireless LAN. Locate rogue wireless access ...
Blue Lance LT Auditor+ (Popularity: ): LT Auditor+ enables administrators to track network activity and alerts users about intrusions through email or paging.
NIKSUN Inc. (Popularity: ): NIKSUN is the recognized worldwide leader in developing and deploying a complete range of network performance monitoring, security surveillance and ...
|
|
Related Press |
|
|
Related Articles |
|
|
|