Security :: What Tools And Techniques Do You Use To Analyze Data?
Apr 15, 2011
For those with IT jobs, how do you handle security monitoring for your company?
1.How do you determine what to monitor-- The most vulnerable assets, most critical or something else?
2.What kind of data do you collect for security monitoring purposes?
3.What tools and techniques do you use to analyze the data?
View 6 Replies
ADVERTISEMENT
Sep 11, 2010
I am looking for tools for static/dynamic code analysis for embedded Linux system development (both device driver and user space apps) with ARM-based processor. We use Eclipse IDE and C++ lanuage for development. Does anybody have recommendation for tools to analyze code complexity? The tools is better to support McCabe complexity metric, however, we may also consider others. Does anybody have recommendation for unit testing?
View 1 Replies
View Related
May 22, 2011
love security/pentest tools. This script adds ALL the tools from the Security Spin, plus Metasploit. Feel free to modify it if need be.
View 12 Replies
View Related
Jun 23, 2010
i have a simple client and sever program in C language. in which client is requesting some parameters( like system up time, memory, no of process etc) form server and server send this information to client.now i want to use DES, AES.RSA. BLOW FISH algorithm to this communication to make it secure. actually i have to compare performance parameters of these cryptographic techniques.but i don't know how to use SSL libraries as SSL library support these cryptographic techniques. but i have no idea how it will work for me
View 4 Replies
View Related
Jun 20, 2010
i have a simple client server program in which different paramters are asked by client. i want to use cryptographic techniques like DES, AES, RSAbut i do not know how and where to use.... i m doing socket programing first time even programing in linux. so i do not know linux functions and libraries and their usage.
View 1 Replies
View Related
Oct 22, 2010
I found lots of pepole who belongs to India and using BSNL Data card wants to connect Internet from fedora so I thought post a thread which will help all how are using BSNL EVDO Data Card. At first click on application - System Tools - Terminal enter the following code on your terminal
Updated part starts here When I was using Fedora 10 I post this thread on that time gedit worked properly with "su" Now here if you are using Fedora 14 and by using su gedit is not appearing then try
Code:
su -
instaed of only "su" hope gedit will work properly. If dose not work then you can follow the next post instructions. Or you can ask in the forum for I am updating "su" by "su -" If you are using earlier version you can try by only "su" or "su-" if none of this works then follow next post. Just remember you have do this in a single terminal and step by step to avoid maximum uses of "su" or "su -"
[Code]...
View 2 Replies
View Related
Jul 12, 2011
i 've been using fedora 14,15 for like few months and i still have a 4GB NTFS partition win XP pro.i have installed fedora in about like 20gb for root and home ext4.i rarely use win xp nowadays (once in a week) considering i was using windows for like years.i have a commondata partition of about 130GB NTFS.i now dont want to use the windows and i want to convert the 130GB NTFS to ext4, but i am worried that if somehow at some point i crash my partition tables and i was using ext4 i wouldn't be able to recover the data as easily as i would in a windows.i want to know whether there is a reliable ext4 data recovery tool for fedora?igoogled and i found this link .. if any of you guys have used these tools can you share the experiences ?Mondo RescueTestDisk safecopy PhotoRecddrescue
View 4 Replies
View Related
Jul 5, 2010
how efficient and effective are these snort, argus, ossec etc etc for an organization having 3500 PC Network, connected through 700+ Cisco Devices (Layer 2 and Layer 3), and scattered on 130 different sites (geographically)? what should be the combination of products and what should be the architecture for an efficient forensics activity?
View 2 Replies
View Related
Feb 3, 2010
Anyone know if the collection of STD tools have been included in Fedora repositories? Would love to recreate a STD disk based off of F12+ live cd and those tools. (Knoppix Secuity Tools Disk that seem to have died out a couple years back) Great tools, just the distro doesnt support new hardware....but if in a F12+package......all would be good.
View 3 Replies
View Related
Jun 20, 2011
It seems the fingerprint reader is detected, and several related packages are installed, but I can't find any tools available to either set it up. or activate it for use.
View 6 Replies
View Related
Mar 25, 2010
I want to see how secure my company is. I am not too concerned about over the wire, more about someone hacking our wireless.
View 6 Replies
View Related
Feb 23, 2011
Im trying to run some penetration testing on my home wireless and want to know if the tools that backtrack uses are available in the repository.
Specifically tools that can be used to sniff out valid mac addresses and breaking wep encryption-what tools am i looking for?
View 1 Replies
View Related
Apr 10, 2011
Quote: The importance of security should never be underestimated. The consequences of losing data can be disastrous for any organisation. For example, the loss of a single unencrypted laptop may have huge repercussions. This could include breaching data protection legislation with the risk of a significant fine, a loss in the confidence of an organisation, as well as the risk that sensitive data may fall into the hands of a competitor or third party with malicious intent.
View 1 Replies
View Related
Jun 22, 2009
I have already developed file type filtering functions through squid. Now I want to deal with content filtering aspects... What tools are available there for so in linux?
View 6 Replies
View Related
May 21, 2011
iam working on mail server in redhat centos. i want to know how to secure my mail server for heavy loading , any monitoring tools in GUI or console , is any essential tool which is used in Like MNC for mail server..
i know few command in like top,netstat,etc through google but i willing to know some more
View 8 Replies
View Related
Feb 9, 2011
I am currently running a 64-bit Fedora 14 server which hosts a game server, a voice server, and remote desktop functionality, each on a distinct TCP port. I am currently using the built-in firewall to deny all traffic other than ICMP ping/pong and TCP traffic on those specific ports.I am looking for a graphical application which will let me monitor any connections being made to my server in order to keep an eye out for possible security concerns. To be more specific, I'd like to be able to see the source IP addresses, TCP/UDP ports, and individual bandwidth in use by external connections being made to the server, along with any other information that might be helpful in identifying a possible intrusion attempt.
View 3 Replies
View Related
May 28, 2010
I have been setting up multiple security system in the area and was wondering what was the easiest way is to get the camera information that one would need in setting up survellance systems like zoneminder. I use xawtv for testing and
PHP Code:
zmu -d <device_path> -q -v
But how can I get specific information about NTSC/PAL cameras or IP cameras. In other words is there a specific tool for that purpose? I can see my video cameras fine using xawtv -c /dev/video but can I look at those log files to see what setting it used for the cameras
View 1 Replies
View Related
Feb 9, 2010
is someone can guide the best open source tools to monitor as webbase,gui,shell prompt
View 1 Replies
View Related
Jul 1, 2010
Is there a firewall installed and running in 10.04? If so are there any gui tools for configuring it and where are they? If there is not a firewall, what should I install to get one properly up and running?
View 2 Replies
View Related
Feb 16, 2011
software to use against Intrusion and such. The thing is that I don't want to have several anti virus programs running at the same time due to collision.
View 9 Replies
View Related
Jun 6, 2011
I've been using pdfTk to encrypt PDFs for distribution to unsophisticated users (that is, users without PGP keys or the will to get one). RC4 encryption, although reasonably adequate for my use, is relatively insecure. I would be more comfortable with AES. Have any gnu tools emerged that implement AES within a PDF container?
View 2 Replies
View Related
Aug 23, 2010
I am searching that how i can configure syslogs/rsyslog to receive third party tools or softwares logs. For example i have a program that generates logs like when it is started and logs about its services, alerts if there are any alarms etc. I want to forward these logs using syslogs/rsyslog. Is their any possibility how can i achieve that
View 2 Replies
View Related
Oct 8, 2010
How to secure a Terminal Server. so that it can't be hacked by bruteforce/divtionary tools ?
View 7 Replies
View Related
Mar 17, 2010
I'm running Apache2 under uBuntu 9.10. My problem is that I use my own user "wavesailor" to work on my websites. I kept all my sites under /var/www and I set up the security of the directory after following the guidelines.
Code:
sudo chown -R root:root /var/www
sudo chown -R www-data:www-data /var/www/*
[code]...
View 4 Replies
View Related
Apr 16, 2010
When writing a script using command-line tools why is it more difficult using graphical tools?
View 3 Replies
View Related
Apr 8, 2010
I checked xen-tools on a Debian Lenny system
Got following
Code:
This package contains tools to manage Debian based XEN virtual servers.
Using the scripts you can easily create fully configured Xen guest domains (domU) which can be listed, updated, or copied easily.
Homepage: [url] in the above output I am getting a line Conffiles and then you can see a series of /etc what are that and is it an error or some conflict?
View 2 Replies
View Related
Sep 2, 2010
I need to install the scripts of angstrom distribution
ie ARM gcc..................how to install the scrpits from the site [url]
View 1 Replies
View Related
Apr 7, 2010
I need to know what this means and what to do to fix this. code...
View 9 Replies
View Related
Mar 17, 2011
I need a tool to analyse the output of sar command. just like sarg which analyses the log files for http , squid etc . I need a similar tool for sar output analysis.
View 3 Replies
View Related
Aug 17, 2011
We have seen with the release of Fedora 15, systemd is the new start-up services, which will replace SysVinit and Upstart on most Linux distributions. Here are some tips based on the order systemd-analyze, for analyzing the startup time of your OS.On commence avec l'option time, qui affiche le temps total de d�marrage de votre syst�me : (One starts with l' option time, which posts the total time of starting of your system: )
Code:
$ systemd-analyze time
Startup finished in 6385ms (kernel) + 3228ms (initrd) + 49335ms (userspace) = 58949ms
[code]....
View 3 Replies
View Related