Tag Archive: Network Forensics

NetworkMiner

NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic. NetworkMiner collects data (such as forensic evidence) about hosts on the network rather than to …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/06/networkminer/

Zenoss Core

Zenoss Core is today’s premier, open-source IT monitoring solution. Using a single, web-based console and agentless technology, you can monitor and manage the performance and availability of all devices in your IT infrastructure (network, server, storage, applications, converged infrastructure, virtualization/cloud). The power of Zenoss Core begins with its in-depth IT inventory and configuration database. Zenoss …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/06/zenoss-core/

The Dude

The Dude network monitor is a new application by MikroTik which can dramatically improve the way you manage your network environment. It will automatically scan all devices within specified subnets, draw and layout a map of your networks, monitor services of your devices and alert you in case some service has problems. Features: The Dude …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/06/the-dude/

PRTG

PRTG Network Monitor runs on a Windows machine within your network, collecting various statistics from the machines, software, and devices which you designate. (It can also autodiscover them, helping you map out your network.) It also retains the data so you can see historical performance, helping you react to changes. PRTG comes with an easy-to-use …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/06/prtg/

Microsoft Message Analyzer

Microsoft Message Analyzer is a new tool for capturing, displaying, and analyzing protocol messaging traffic and other system messages. Message Analyzer also enables you to import, aggregate, and analyze data from log and trace files. It is the successor to Microsoft Network Monitor 3.4 and a key component in the Protocol Engineering Framework (PEF) that …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/05/microsoft-message-analyzer/

Forensic Toolkit® (FTK®)

FTK is a court-accepted digital investigations platform that is built for speed, analytics and enterprise-class scalability. Known for its intuitive interface, email analysis, customizable data views and stability, FTK lays the framework for seamless expansion, so your computer forensics solution can grow with your organization’s needs. In addition AccessData offers new expansion modules delivering an …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/03/03/forensic-toolkit-ftk-commercial-app/

Windows Firewall Log Analyser

Windows Firewall Log Analyser is a free utility that will read and analyse your native Windows (XP, Vista, Win 7, Win 8 32/64 bit) Firewall Log. It will quickly show you what protocols, ports and source hosts are the most active on your network. Using the WinFirewallLogAnalyser can help you to rapidly track down the …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/03/03/windows-firewall-log-analyser/

Forensic Focus Discussion Forum

Forensic Focus is the web’s leading digital forensics portal for computer forensics and eDiscovery professionals. Founded in July 2002, the site quickly developed a reputation for encouraging open discussion and information sharing in support of best practice development within the digital forensics industry. Although perhaps best known for its busy forums, Forensic Focus also offers …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/11/02/forensic-focus-discussion-forum/

Computer Security CSc 48000–Spring 2013

This course provides an overview of computer security principles, ranging from cryptography to network security, to operating systems and software security. The course will help you learn the principles and practices of computer security in various computing environments. The goal is to enable you to analyze, understand and evaluate the security of computer systems. View …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/10/17/computer-security-csc-48000-spring-2013/

GnackTrack

GnackTrack is an open and free project to merge penetration testing tools and the linux Gnome desktop. GnackTrack is a Live (and installable) Linux distribution designed for Penetration Testing and is based on Ubuntu. Download GnackTrack

Permanent link to this article: http://www.darknessgate.com/2013/06/14/gnacktrack/

Network Security Toolkit (NST)

Network Security Toolkit (NST). This bootable ISO live CD/DVD (NST Live) is based on Fedora. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/06/14/network-security-toolkit-nst/

Page 4 of 9« First...23456...Last »