Supported Software

Total Page:16

File Type:pdf, Size:1020Kb

Supported Software The following table identifies the log types that the Binary Defense SIEM supports out of the box. SUPPORTED SOFTWARE Vendor Supported Software A10 Thunder WAF Abas ERP Abas Accellion Kiteworks Actiontec Verizon FIOS router Adtran NetVanta Aerohive Networks Wireless Access Point Alcatel Arista Switch AlienVault Agent | Availability-Monitoring | HIDS | Monit | Monitor |Netflow Alerts | NIDS | Nmap Hosts | Nmap Monitor | OCS Monitor | Ping Monitor | Post-Correlation | TCPTrack Monitor | USBdev | User Activity | Whois Monitor | WMI Application Logger | WMI Monitor | WMI Security Logger | WMI System Logger Allot Communications NetEnforcer Amun Amun Honeypot Anti-Spam SMTP Proxy Anti-Spam SMTP Proxy Apache Software Foundation Apache HTTP Server | OpenLDAP | SpamAssassin | Tomcat | Apple AirPort Extreme | OS-X AQTRONiX WebKnight Arbor Networks Pravail APS Arista Switches Arpalert Arpalert Array Networks Secure Access Gateway Artemisa Artemisa Honeypot Artica Proxy Aruba Networks Airwave | ClearPass | Mobility Access Switches | Wireless Asterisk VoIP AsusTek Wireless Router Automatic Software Solutions HoneyBOT Automation Access Tarantella Avast Free Antivirus Avaya Media Gateway | VSP switches | Wireless LAN Barracuda Link Balancer | Next Gen Firewall | Spam Firewall | SSL VPN | Web Application Firewall | Web Filter Binary Defense Artillery Honeypot Bitdefender GravityZone Blackboard Learn Blue Coat PacketShaper | ProxySG Bomgar Remote Support and Privileged Access Bro Bro NSM Broadweb IPS-Netkeeper | Netkeeper NIDS Brocade Brocade Devices | Vyatta vRouter Buffalo AM TeraStation Canary Tools Carbon Black Defense | Enterprise Protection | Enterprise Response Cerberus FTP Server Check Point FireWall | Media Encryption and Port Protection Ciena Packetwave Cisco ACE Application Control Engine | ACS Secure Access Control Server | ASA Adaptive Security Appliance | ASR Aggregation Services Router | AsyncOS Email Security Appliance | Call Manager | Cisco Unified Border Element | Expressway | FirePower | Firewall Services Module | IDS Intrusion Detection System | IPS Intrusion Prevention System | IronPort | ISA | ISE | Lancope StealthWatch | Meraki | Next Generation Intrusion Prevention System NGIPS | NX-OS | OpenDNS Enterprise Insights | PIX Private Internet Confidential & Proprietary Information 1 eXchange | Prime | Router | RV Series VPN Router | Unified Communications Manager | Unified Computing System | Viptela | VPN | VPN 3000 Series | Wireless LAN Controller Citrix NetScaler ClamAV ClamAV ClamWin ClamWin Free Antivirus Claroty Platform Clearswift Secure Email Gateway ClickStudios Passwordstate CloudPassage Halo Comodo Antivirus ContentKeeper Secure Internet Gateway Corero IPS CorreLog CorreLog Windows Agent and Toolkit Courier-MTA Courier Mail Server CrowdStrike Falcon Host CrushFTP CrushFTP CRYPTTECH CryptoSPOT CyberArk Enterprise Password Vault CyberGuard SG565 CyberX XSense Cylance CylancePROTECT Cyphort Cyphort APT Defense Platform D-Link DES Series | Unified Wireless Controller | UTM Firewall Damballa Failsafe Darktrace DCIP Datto Siris Platform Dell EMC DataDomain | EMC Isilon | EMC Recover Point | EMC VNXe | EqualLogic | Foce10 Switches | iDRAC | M1000 Chassis | SecureWorks | SonicWALL Scrutinizer | SonicWall VPN | Switches DenyAll DenyAll WAF Digital Defense Incorporated Frontline Vulnerability Manager Dovecot Secure IMAP Server DrayTek Vigor Drupal Drupal CMS Dtex Systems Dtex Duo Two-Factor Authentication Edgewave iPrism Enterasys Dragon IDS | Matrix N- Series Envault Airlock Eset Eset Evolium Redtrust Extenua SilverSHielD ExtraHop Reveal Extreme Networks NetSight NAC Manager | Summit Series | Switch F5 BIG-IP | FirePass SSL VPN Fail2ban Fail2ban FalconStor Software IPStor FatPipe Networks MPVPN FireEye CM | HX Series | MPS ForcePoint Triton AP-Web ForeScout CounterACT Confidential & Proprietary Information 2 Fortinet FortiAuthenticator | FortiGate | FortiGuard | FortiMail | Fortiweb | fortiWLC | Meru Networks WLAN Controller FreeBSD IPFW Firewall | NTPdate Free IPA FreeIPA FreeRADIUS Freeradius GeCAD Axigen Mail Server Geist Watchdog GFI Vipre Antivirus Global Technology Associates Firewall H3C AP | Ethernet Switch HAProxy HAProxy HARPP HARPP DDoS Mitigator HelpSystems Powertech Interact Hewlett Packard Enterprise Integrated Lights Out Hitachi NAS Platform Honeyd Honeyd Virtual Honeypot Honeynet Project GlastopfNG Honeypot | Nepenthes Honeypot HP BladeSystem Chassis | E-Series Mobility | EVA Storage | MSM Integrated Controller | SAN Switch | Serviceguard | SiteScope | Switch HPE 3PAR Huawei Enterprise Router | IPS | NG-Firewall HyTrust Key Control IBM Aix Audit | AS400 | Fidelis Network Data Loss Protection | InfoSphere Guardium | Integrated Management Module | Proventia IPS | RASlog | RealSecure Server Sensor | Storwize V7000 | Tivoli Access Manager WebSEAL | VisionPLUS | Websphere IBM Internet Security Systems Site Protector IBoss Iboss Immunity El Jefe Imperva Incapsula WAF | SecureSphere Imprivata Onesign Infoblox DNS Server Innovative Solutions LinQ2FA Intersect Alliance Snare Inverse Inc PacketFence ISC BIND Juniper Networks EX Series | IDP Series | ISG Series | MX Routers | NetScreen Security Manager | NetScreen Series Firewall | NetWork and Security Manager | NSM Network and Security Manager | SA Secure Access Series | SRX Series Kaspersky Antivirus | Security Center Kemp Technologies VLM-2000-W Kerio Technology Kerio Connect Kismet Kismet Wireless Linux DHCP | DHCP Server | NFS Network File System | Useradd/Groupadd Linux-HA Heartbeat LOGbinder LOGbinder for SharePoint Lucent VPN Firewall Brick M0n0wall M0n0wall Embedded Firewall Malwarebytes Breach Remediation | Endpoint Security | Malwarebytes Manage Engine ADAudit Plus | Password Manager Pro McAfee Anti-Spam | Antivirus Engine | Database Security | ePolicy Orchestrator | Firewall Enterprise | IntruShield IPS | McAfee-MWG | Network Security Platform Microfocus Voltage Confidential & Proprietary Information 3 Microsoft Advanced Threat Analytics | Advanced Threat Protection | DHCP Client Service | DNS Server | Enhanced Mitigation Experience Toolkit | Exchange Server | IIS | ISA Internet Security and Acceleration Server | MSSQL | Multi-Factor Authentication | Network Policy Server | Office 365 Advanced Security Management | SCOM | SQL Server | Sysmon | System Center Configuration Manager | Windows | Windows Firewall | Windows IIS FTP Server MikroTik Router MobileIron Sentry Moodle Moodle Motorola RFS 4000 | RFS Series Mwcollect Mwcollect Honeypot NBS System Naxsi Netasq U-Series Netgear FVS318 ProSafe VPN Firewall | Switch NETGEAR Switch NetMotion Moblity VPN Netwrix Netwrix Auditor NGinX NGinX Nimble Nimble-OS Nortel Networks Alteon | Baystack Ethernet Switch | Passport 1612 Switch NTSyslog NTSyslog ObserveIT ObserveIT OISF Suricata Open-Xchange PowerDNS OpenBSD OpenSSH | PF Packet Filter OpenLDAP OpenLDAP OpenNMS OpenNMS OpenSwan IPsec OpenVPN OpenVPN Access Server Optenet MailSecure Oracle Audit Vault and Database Firewall | Database Server | JD Edwards EnterpriseONE | MySQL Server | Palerra Cloud Security | WebLogic Server | OSC Radiator RADIUS Sever Osiris Osiris HIDS OSquery OSquery OwnCloud OwnCloud Palo Alto Networks PA-5000 Series | Traps Panda Security AdminSecure | Security for Enterprise Peplink Balance Multi-WAN Router Plixer Scrutinizer Postfix Postfix PostgreSQL GDG Postgresql Power Admin PA File Sight Prads Prads Preempt Security Behavioral Firewall ProFTPD ProFTPD Proofpoint Protection Server | Targeted Attack Protection Proxim Orinoco AP700 Pulse Secure Virtual Traffic Manager Pure Storage Purity Operating Environment Pure-FTPd Pure-FTPd QNAP QTS Quest Software Defender GO-6 Token Quick Heal SQEPS6.3 Radware APSolute Vision | DefensePro Rapid7 Nexpose Confidential & Proprietary Information 4 Red Hat Audit | JBoss Middleware | Resource Group (Cluster Service) Manager Daemon Riverbed Technology SteelHead | Xirrus Wireless Access Point Roksit Roksit DNS Firewall RRDtool RRDtool RSA Authentication Manager | SecurID | SecurID Software Token Converter RSA Security SecurID IDR Rubrik Backup Ruckus ZoneDirector SafeNet Authentication Service SafeNet eSafe Samba Samba SMB Samhain Labs Samhain Sangfor NGFW SAP NetWeaver SecureAuth SecureAuth SecureLink Enterprise Security Matters SilentDefense Seeburger BIS SendMail SendMail SentinelOne SentinelOne Shorewall Shorewall Shrubbery Networks TACACS+ SiteMinder Policy-Server Snort Snort Softerra Adaxes SoftEther VPN SoftEther VPN Solida Systems International Solida SL-6000 Sophos Antivirus | Central | Cyberoam-Firewall | EC | ES | Secure Web Gateway | Sophos-UTM | XG Squid Squid Cache Proxy SquidGuard SquidGuard STEALTHbits Activity Monitor | StealthINTERCEPT Stonesoft IPS | StoneGate Stormshield Network Security Stunnel Stunnel Sudo Sudo Suhosin Suhosin PHP Security Extension Suse IPTables Symantec AMS | ATP | Data Loss Prevention | Endpoint Protection | Messaging Gateway | Protection Synology DiskStation Syslog Syslog Tanium EndPoint Platform Tenable Nessus Tesserent Managed Next Gen Firewall Thycotic Software Secret Server TitanHQ SpamTitan Trend Micro Control Manager | Deep Discovery Inspector | Deep Security Agent | Deep Security Manager | InterScan Messaging Security | InterScan Web Security Virtual Applicance | TippingPoint IPS | Vulnerability Protection Tripwire Enterprise Trustwave Secure Web Gateway TrustWave SpiderLabs ModSecurity Web Application Firewall Tufin Tufin Orchestration Suite Ubiquiti TOUGHSwitch PoE | Unifi UNIX PAM Pluggable Authentication Module Untangle NG Firewall Confidential & Proprietary Information 5 VanDyke VShell vArmour Firewall Vectra X-Series VMware ESXi | NSX | Single Sign On Server | vCenter | View Administrator | vShield | Workstation Vormetric Data Security Manager Vsftpd Vsftpd WatchGuard XCS | XTM Series Webmin Webmin Webroot FlowScape Websense Content Gateway | Email Security Gateway | Web Security Gateway Wing FTP Software Wing FTP Server WU-Ftp WU_Ftp Xtera AscenLink Yara Yara ZeroFox Social Media Security SAAS Platform zScaler Nanolog ZyXEL ZyWALL Confidential & Proprietary Information 6 .
Recommended publications
  • Campus Networking Best Practices Session 5: Wireless
    Campus Networking Best Practices Session 5: Wireless LAN Hervey Allen Dale Smith NSRC & University of Oregon University of Oregon & NSRC [email protected] [email protected] Wireless LAN • Provide wireless network across your campus that has the following characteristics: – Authentication – only allow your users – Roaming – allow users to start up in one section of your network, then move to another location – Runs on your campus network Firewall/ Border Traffic Shaper Router Wireless REN switch Authentication Core Gateway Router Core Servers Network Access Control (NAC) Enterprise Identity Management • Processes and Documentation of users. – Now you must deal with this. – What to use as the back-end user store? • LDAP • Active Directory • Kerberos • Other? – Will this play nice with future use? • email, student/staff information, resource access, ... Identity Management Cont. • An example of such a project can be seen here: – http://ccadmin.uoregon.edu/idm/ • This is a retrofit on to an already retrofitted system. • Learn from others and try to avoid this situation if possible. A Wireless Captive Portal The Wireless Captive Portal • Previous example was very simple. • A Captive Portal is your chance to: – Explain your Acceptable Use Policies – Decide if you must authenticate, or – Allow users on your network and monitor for problems instead (alternate solution). – Anything else? Branding? What's Happening? • remember our initial network diagrams...? • Do you think our hotel built their own solution? • Probably not... Commercial Solutions • Aruba http://www.arubanetworks.com/ • Bradford Networks – http://www.bradfordnetworks.com/ • Cisco NAC Appliance (Clean Access) – http://www.cisco.com/en/US/products/ps6128/ • Cisco Wireless LAN Controllers – http://www.cisco.com/en/US/products/hw/wireless/ • Enterasys http://www.enterasys.com/ • Vernier http://www.verniernetworks.com Open Source Solutions • CoovaChilli (morphed from Chillispot) – http://coova.org/wiki/index.php/CoovaChilli – Uses RADIUS for access and accounting.
    [Show full text]
  • Server Administration Manual Release Latest
    Nextcloud Server Administration Manual Release latest The Nextcloud developers Oct 01, 2021 CONTENTS 1 Introduction 1 1.1 Videos and blogs.............................................1 1.2 Target audience..............................................1 2 Release notes 3 3 Maintenance and release schedule5 3.1 Major releases..............................................5 3.2 Maintenance releases...........................................5 3.3 Older versions..............................................6 4 Installation and server configuration7 4.1 System requirements...........................................7 4.2 Deployment recommendations......................................9 4.3 Installation on Linux...........................................9 4.4 Installation wizard............................................ 17 4.5 Installing from command line...................................... 21 4.6 Supported apps.............................................. 22 4.7 SELinux configuration.......................................... 24 4.8 NGINX configuration.......................................... 27 4.9 Hardening and security guidance.................................... 36 4.10 Server tuning............................................... 40 4.11 Example installation on Ubuntu 20.04 LTS............................... 42 4.12 Example installation on CentOS 8.................................... 44 4.13 Example installation on OpenBSD.................................... 48 5 Nextcloud configuration 53 5.1 Warnings on admin page........................................
    [Show full text]
  • Iptables with Shorewall!
    Iptables with shorewall! Table of Contents 1. Install swarmlab-sec (Home PC) . 1 2. shorewall . 1 2.1. Installation . 2 3. Basic Two-Interface Firewall. 2 4. Shorewall Concepts . 3 4.1. zones — Shorewall zone declaration file . 3 4.2. interfaces — Shorewall interfaces file. 4 4.3. policy — Shorewall policy file . 4 4.4. rules — Shorewall rules file . 4 4.5. Compile then Execute . 4 5. Three-Interface Firewall. 5 5.1. zones . 6 5.2. interfaces . 6 5.3. policy . 7 5.4. rules . 7 5.5. masq - Shorewall Masquerade/SNAT definition file . 7 5.6. snat — Shorewall SNAT/Masquerade definition file . 8 5.7. Compile and Execute . 8 1. Install swarmlab-sec (Home PC) HowTo: See http://docs.swarmlab.io/lab/sec/sec.adoc.html NOTE Assuming you’re already logged in 2. shorewall Shorewall is an open source firewall tool for Linux that builds upon the Netfilter (iptables/ipchains) system built into the Linux kernel, making it easier to manage more complex configuration schemes by providing a higher level of abstraction for describing rules using text files. More: wikipedia 1 NOTE Our docker instances have only one nic to add more nic’s: create netowrk frist docker network create --driver=bridge --subnet=192.168.0.0/16 net1 docker network create --driver=bridge --subnet=192.168.0.0/16 net2 docker network create --driver=bridge --subnet=192.168.0.0/16 net3 then connect network to container connect network created to container docker network connect net1 master docker network connect net1 worker1 docker network connect net2 master docker network connect net2 worker2 now let’s look at the following image 2.1.
    [Show full text]
  • Sentry Firewall CD HOWTO Sentry Firewall CD HOWTO Table of Contents
    Sentry Firewall CD HOWTO Sentry Firewall CD HOWTO Table of Contents Sentry Firewall CD HOWTO............................................................................................................................1 Stephen A. Zarkos, Obsid@Sentry.net....................................................................................................1 1. Introduction..........................................................................................................................................1 2. How the CD Works (Overview)..........................................................................................................1 3. Obtaining the CDROM........................................................................................................................1 4. Using the Sentry Firewall CDROM.....................................................................................................1 5. Overview of Available Configuration Directives................................................................................1 6. Setting Up a Firewall...........................................................................................................................2 7. Troubleshooting...................................................................................................................................2 8. Building a Custom Sentry CD.............................................................................................................2 9. More About the Sentry Firewall Project..............................................................................................2
    [Show full text]
  • Linux Networking Cookbook.Pdf
    Linux Networking Cookbook ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Networking Cookbook™ by Carla Schroder Copyright © 2008 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Indexer: John Bickelhaupt Production Editor: Sumita Mukherji Cover Designer: Karen Montgomery Copyeditor: Derek Di Matteo Interior Designer: David Futato Proofreader: Sumita Mukherji Illustrator: Jessamyn Read Printing History: November 2007: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The Cookbook series designations, Linux Networking Cookbook, the image of a female blacksmith, and related trade dress are trademarks of O’Reilly Media, Inc. Java™ is a trademark of Sun Microsystems, Inc. .NET is a registered trademark of Microsoft Corporation. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
    [Show full text]
  • Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd
    Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd. and members of the Ubuntu Documentation Project3 Abstract Welcome to the Ubuntu Server Guide! It contains information on how to install and configure various server applications on your Ubuntu system to fit your needs. It is a step-by-step, task-oriented guide for configuring and customizing your system. Credits and License This document is maintained by the Ubuntu documentation team (https://wiki.ubuntu.com/DocumentationTeam). For a list of contributors, see the contributors page1 This document is made available under the Creative Commons ShareAlike 2.5 License (CC-BY-SA). You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license. This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER. A copy of the license is available here: Creative Commons ShareAlike License2. 3 https://launchpad.net/~ubuntu-core-doc 1 ../../libs/C/contributors.xml 2 /usr/share/ubuntu-docs/libs/C/ccbysa.xml Table of Contents 1. Introduction ........................................................................................................................... 1 1. Support .......................................................................................................................... 2 2. Installation ............................................................................................................................
    [Show full text]
  • Set up Mail Server Documentation 1.0
    Set Up Mail Server Documentation 1.0 Nosy 2014 01 23 Contents 1 1 1.1......................................................1 1.2......................................................2 2 11 3 13 3.1...................................................... 13 3.2...................................................... 13 3.3...................................................... 13 4 15 5 17 5.1...................................................... 17 5.2...................................................... 17 5.3...................................................... 17 5.4...................................................... 18 6 19 6.1...................................................... 19 6.2...................................................... 28 6.3...................................................... 32 6.4 Webmail................................................. 36 6.5...................................................... 37 6.6...................................................... 38 7 39 7.1...................................................... 39 7.2 SQL.................................................... 41 8 43 8.1...................................................... 43 8.2 strategy.................................................. 43 8.3...................................................... 44 8.4...................................................... 45 8.5...................................................... 45 8.6 Telnet................................................... 46 8.7 Can postfix receive?..........................................
    [Show full text]
  • Papers/Openwrt on the Belkin F5D7230-4.Pdf
    WHITE PAPER OpenWRT on the Belkin F5D7230-4 Understanding the Belkin extended firmware for OpenWRT development White Paper OpenWRT on the Belkin F5D7230-4 Understanding the Belkin extended firmware for OpenWRT development CONTROL PAGE Document Approvals Approved for Publication: Author Name: Ian Latter 7 November 2004 Document Control Document Name: OpenWRT on the Belkin F5D7230-4; Understanding the Belkin extended firmware for OpenWRT development Document ID: openwrt on the belkin f5d7230-4.doc-Release-0.4(31) Distribution: Unrestricted Distribution Status: Release Disk File: C:\papers\OpenWRT on the Belkin F5D7230-4.doc Copyright: Copyright 2004, Ian Latter Version Date Release Information Author/s 0.4 07-Nov-04 Release / Unrestricted Distribution Ian Latter 0.3 26-Oct-04 Release / Unrestricted Distribution Ian Latter 0.2 24-Oct-04 Release / Unrestricted Distribution Ian Latter Distribution Version Release to 0.4 MidnightCode.org (correction of one grammatical error) 0.3 MidnightCode.org (correction of two minor errors) 0.2 MidnightCode.org Unrestricted Distribution Copyright 2004, Ian Latter Page 2 of 38 White Paper OpenWRT on the Belkin F5D7230-4 Understanding the Belkin extended firmware for OpenWRT development Table of Contents 1 OVERVIEW..................................................................................................................................4 1.1 IN BRIEF .................................................................................................................................4 1.2 HISTORY ................................................................................................................................4
    [Show full text]
  • Taxonomy of WRT54G(S) Hardware and Custom Firmware
    Edith Cowan University Research Online ECU Publications Pre. 2011 2005 Taxonomy of WRT54G(S) Hardware and Custom Firmware Marwan Al-Zarouni Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/ecuworks Part of the Computer Sciences Commons Al-Zarouni, M. (2005). Taxonomy of WRT54G(S) hardware and custom firmware. In Proceedings of 3rd Australian Information Security Management Conference (pp. 1-10). Edith Cowan University. Available here This Conference Proceeding is posted at Research Online. https://ro.ecu.edu.au/ecuworks/2946 Taxonomy of WRT54G(S) Hardware and Custom Firmware Marwan Al-Zarouni School of Computer and Information Science Edith Cowan University E-mail: [email protected] Abstract This paper discusses the different versions of hardware and firmware currently available for the Linksys WRT54G and WRT54GS router models. It covers the advantages, disadvantages, and compatibility issues of each one of them. The paper goes further to compare firmware added features and associated filesystems and then discusses firmware installation precautions and ways to recover from a failed install. Keywords WRT54G, Embedded Linux, Wireless Routers, Custom Firmware, Wireless Networking, Firmware Hacking. BACKGROUND INFORMATION The WRT54G is a 802.11g router that combines the functionality of three different network devices; it can serve as a wireless Access Point (AP), a four-port full-duplex 10/100 switch, and a router that ties it all together (ProductReview, 2005). The WRT54G firmware was based on embedded Linux which is open source. This led to the creation of several sites and discussion forums that were dedicated to the router which in turn led to the creation of several variants of its firmware.
    [Show full text]
  • Introducción a Linux Equivalencias Windows En Linux Ivalencias
    No has iniciado sesión Discusión Contribuciones Crear una cuenta Acceder Página discusión Leer Editar Ver historial Buscar Introducción a Linux Equivalencias Windows en Linux Portada < Introducción a Linux Categorías de libros Equivalencias Windows en GNU/Linux es una lista de equivalencias, reemplazos y software Cam bios recientes Libro aleatorio análogo a Windows en GNU/Linux y viceversa. Ayuda Contenido [ocultar] Donaciones 1 Algunas diferencias entre los programas para Windows y GNU/Linux Comunidad 2 Redes y Conectividad Café 3 Trabajando con archivos Portal de la comunidad 4 Software de escritorio Subproyectos 5 Multimedia Recetario 5.1 Audio y reproductores de CD Wikichicos 5.2 Gráficos 5.3 Video y otros Imprimir/exportar 6 Ofimática/negocios Crear un libro 7 Juegos Descargar como PDF Versión para im primir 8 Programación y Desarrollo 9 Software para Servidores Herramientas 10 Científicos y Prog s Especiales 11 Otros Cambios relacionados 12 Enlaces externos Subir archivo 12.1 Notas Páginas especiales Enlace permanente Información de la Algunas diferencias entre los programas para Windows y y página Enlace corto GNU/Linux [ editar ] Citar esta página La mayoría de los programas de Windows son hechos con el principio de "Todo en uno" (cada Idiomas desarrollador agrega todo a su producto). De la misma forma, a este principio le llaman el Añadir enlaces "Estilo-Windows". Redes y Conectividad [ editar ] Descripción del programa, Windows GNU/Linux tareas ejecutadas Firefox (Iceweasel) Opera [NL] Internet Explorer Konqueror Netscape /
    [Show full text]
  • Inferring Higher Level Policies from Firewall Rules ∗
    Inferring Higher Level Policies from Firewall Rules ∗ Alok Tongaonkar, Niranjan Inamdar, and R. Sekar Department of Computer Science, Stony Brook University. falok, ninamdar, [email protected] June 5, 2008 Abstract Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of firewall management. Typically, firewalls use a large number of low-level filtering rules which are configured using vendor-specific tools. System administrators start off by writing rules which implement the security policy of the organization. They add/delete/change order of rules as the requirements change. For example, when a new machine is added to the network, new rules might be added to the firewall to enable certain services to/from that machine. Making such changes to the low-level rules is complicated by the fact that the effect of a rule is dependent on its priority (usually determined by the position of the rule in the rule set). As the size and complexity of a rule set increase, it becomes difficult to understand the impact of a rule on the rule set. This makes management of rule sets more error prone. This is a very serious problem as errors in firewall configuration mean that the desired security policy is not enforced. Previous research in this area has focused on either building tools that generate low-level firewall rules from a given security policy or finding anomalies in the rules, i.e., verifying that the rules implement the given security pol- icy correctly.
    [Show full text]
  • Download Appendix A
    Appendix A Resources Links This list includes most of the URLs referenced in this book. For more online resources and further reading, see our website at http://bwmo.net/ Anti-virus & anti-spyware tools • AdAware, http://www.lavasoftusa.com/software/adaware/ • Clam Antivirus, http://www.clamav.net/ • Spychecker, http://www.spychecker.com/ • xp-antispy, http://www.xp-antispy.de/ Benchmarking tools • Bing, http://www.freenix.fr/freenix/logiciels/bing.html • DSL Reports Speed Test, http://www.dslreports.com/stest • The Global Broadband Speed Test, http://speedtest.net/ • iperf, http://dast.nlanr.net/Projects/Iperf/ • ttcp, http://ftp.arl.mil/ftp/pub/ttcp/ 260! The Future Content filters • AdZapper, http://adzapper.sourceforge.net/ • DansGuard, http://dansguardian.org/ • Squidguard, http://www.squidguard.org/ DNS & email • Amavisd-new, http://www.ijs.si/software/amavisd/ • BaSoMail, http://www.baso.no/ • BIND, http://www.isc.org/sw/bind/ • dnsmasq, http://thekelleys.org.uk/dnsmasq/ • DJBDNS, http://cr.yp.to/djbdns.html • Exim, http://www.exim.org/ • Free backup software, http://free-backup.info/ • Life with qmail, http://www.lifewithqmail.org/ • Macallan Mail Server, http://macallan.club.fr/ • MailEnable, http://www.mailenable.com/ • Pegasus Mail, http://www.pmail.com/ • Postfix, http://www.postfix.org/ • qmail, http://www.qmail.org/ • Sendmail, http://www.sendmail.org/ File exchange tools • DropLoad, http://www.dropload.com/ • FLUFF, http://www.bristol.ac.uk/fluff/ Firewalls • IPCop, http://www.ipcop.org/ • L7-filter, http://l7-filter.sourceforge.net/
    [Show full text]