Honore With His Spouce IGA KUBUNTU! OWNER. BLOG SITE. This is My Child FUTURE COMPUTER TECHNOLOGY
blogger JavaScript Rocks.

Thursday, 24 April 2014

HOW TO BE A GOOD SYSTEM ADMINISTRATOR?



SysAdmin, Random Password Generator, Eraser, OWASP Mantra, Retina Network Community, OpenStego, Freeraser, OpenPuff, Network Security Toolkit, Security Onion






 








1.Random Password Generator

This form allows you to generate random passwords. The randomness comes from atmospheric noise, which for many purposes is better than the pseudo-random number algorithms typically used in computer programs.

2.Eraser

Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.

3.OWASP Mantra

Mantra is brought to you by OWASP, a free and open software security community focusing on improving the security of software. OWASP Mantra comes with a powerful set of tools. FireCAT integration makes it even more accessible.

4.Retina Network Community

Retina Community gives you powerful vulnerability management across your entire environment. For up to 256 IPs free, Retina Community identifies network vulnerabilities (including zero-day), configuration issues, and missing patches across operating systems, applications, devices, and virtual environments.

5.OpenStego

OpenStego provides two main functionalities- It can hide any data within a cover file (e.g. images), Watermarking files (e.g. images) with an invisible signature. It can be used to detect unauthorised file copying.

6.Freeraser

Destroy files and eliminate any possibility of their restoration with Portable Freeraser. This free files shredder destroys the data you choose before the deletion by filling the actual content of the file according to the predefined method.

7.OpenPuff

OpenPuff is a professional steganography tool, with unique features you won't find among any other free or commercial software. OpenPuff is 100 per cent free and suitable for highly sensitive data covert transmission. Data is split among many carriers. Only the correct carrier sequence enables unhiding. Moreover, up to 256Mb can be hidden, if you have enough carriers at disposal. Last carrier will be filled with random bits in order to make it undistinguishable from others.

8.OpenVAS

OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. The actual security scanner is accompanied with a daily updated feed of Network Vulnerability Tests (NVTs).

9.Network Security Toolkit

This bootable ISO live CD/DVD (NST Live) is based on Fedora. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms.

10.Security Onion

Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It's based on Ubuntu and contains Snort, Suricata, Bro, OSSEC, Sguil, Squert, Snorby, ELSA, Xplico, NetworkMiner, and many other security tools. 
by:HONORE HAGUMA

Related Posts:

  • MICROSOFT HAS STOPPED SUPPORTING WIN XP AND OFFICE 2003 XP will become an easy target for attackers now that Microsoft has stopped supporting it, said Wolfgang Kandek, CTO for IT security firm Qualys.A The OS will no longer receive fixes for holes that Microsoft a… Read More
  • HOW TO RUN WINDOWS XP IN VIRTUAL MACHINE?   While most Windows XP software works just fine in Windows 8, some applications do indeed have compatibility issues. Fortunately, there's a way you can run any Windows XP software at all, using virtualization. … Read More
  • how to delete data from pen drive permanently? My flash drive contains a lot of sensitive data. Now, I need to give my flash drive to one of my friends. I have formatted my USB Flash Drive using the format option in Windows. But I read somewhere th… Read More
  • LIST OF SOFTWARE TO PROTECT YOUR FILES   1. Folder Lock This software allows you to encrypt your files and folders by password protecting them. It is one of the best known and most used encryption software.2. Advanced Encryption Package ProThi… Read More
  • HOW TO PROTECT YOUR LAPTOP? There are steps you can take to reduce the risk. Here are 10 simple things you can do to help keep your laptop secure when you are on the go. 1.Use a password Ensure that your Windows account is protected w… Read More

0 comments:

Post a Comment