Tag: Network Forensics

Computer Security Course Lectures – Israel Institute of Technology (Winter 2013-2014)

Course Objectives: Learning the different threats on computer systems. Learning different approaches for protecting computer resources. Acquiring the ability to construct and implement security policy. Presenting developments in Information and computer security. The course will not teach how to attack other computers or systems. Syllabus Computer security and information security. Basic design principles: Secrecy. Privacy, …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/08/14/computer-security-course-lectuers-israel-institute-technology-winter-2013-2014/

CS155: Computer and Network Security 2014

The course covers principles of computer systems and network security. We will discuss various attack techniques and how to defend against them. Topics include network attacks and defenses, operating system holes, web security, e-mail, botnet, malware, social engineering attacks, privacy, and digital rights management. Course projects will focus on building reliable code and understanding attacks. …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/08/14/computer-network-security-2/

Computer and Network Security

These lecture notes, at least several of them, made their first appearance on the web in 2006. They have so far gone through seven major revisions. With each revision I have attempted to improve the explanations on the basis of the feedback I receive from the students at Purdue and from other users of these …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/08/14/computer-network-security/

Offensive Computer Security Spring 2014

The primary incentive for an attacker to exploit a vulnerability, or series of vulnerabilities is to achieve a return on an investment (his/her time usually). This return need not be strictly monetary—an attacker may be interested in obtaining access to data, identities, or some other commodity that is valuable to them. The field of penetration …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/08/14/offensive-computer-security-spring-2014/

Nagios

Nagios is a powerful monitoring system that enables organizations to identify and resolve IT infrastructure problems before they affect critical business processes. Designed with scalability and flexibility in mind, Nagios gives you the peace of mind that comes from knowing your organization’s business processes won’t be affected by unknown outages. Nagios is a powerful tool …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/07/05/nagios/

WirelessNetView

WirelessNetView is a small utility that runs in the background, and monitor the activity of wireless networks around you. For each detected network, it displays the following information: SSID, Last Signal Quality, Average Signal Quality, Detection Counter, Authentication Algorithm, Cipher Algorithm, MAC Address, RSSI, Channel Frequency, Channel Number, and more. System Requirements: Wireless network adapter …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/06/10/wirelessnetview/

Xymon systems and network monitor

Xymon is a system for monitoring of hosts and networks, inspired by the Big Brother system. It provides real-time monitoring, an easy web-interface, historical data, availability reports and performance graphs. Xymon monitors your hosts, your network services, and anything else you configure it to do via extensions. Xymon can periodically generate requests to network services …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/06/09/xymon-systems-and-network-monitor/

NetXMS

NetXMS is an enterprise grade multi-platform open source network management and monitoring system. It provides comprehensive event management, performance monitoring, alerting, reporting and graphing for all layers of IT infrastructure — from network devices to business application layer. The system has three-tier architecture: the information is collected by monitoring agents (either our own high-performance agents …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/06/08/netxms/

Total Network Monitor

Total Network Monitor is a free network monitoring software for the continuous monitoring of the local network, individual computers, and services that require careful attention and thorough control. TNM will alert you of any problem in advance and generate a detailed report on the circumstances of the failure. Monitor is a special type of object …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/06/07/total-network-monitor/

Pandora FMS

Pandora FMS is a performance & availability monitoring system, ready for big environments. It uses agents for local monitoring and can do several kinds of remote network monitoring (SNMP v3, TCP checks, remote WMI probes…) Agents works on Linux, Windows, AIX, HP-UX, Solaris and BSD systems. Highly scalable (up to 2000 nodes with one single …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/06/07/pandora-fms/

Capsa Free

Capsa Free is a must-have freeware network analyzer for Ethernet monitoring, troubleshooting and analysis. It provides users with great experience to learn how to monitor network activities, pinpoint network problems, enhance network security and so on. Moreover, Capsa Free is a perfect choice for students, teachers and computer geeks to learn protocols and networking technology …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/06/06/capsa-free/