security

NEWS

Digital Forensics

Lance Parlier covers the basics of what digital forensics is and why we need it. He provides examples of when digital forensics has been used successfully in the past, and how digital forensics can be used to determine what was compromised on a computer. He also touches on some digital ...

Read more

Digital Forensics

Lance Parlier covers the basics of what digital forensics is and why we need it. He provides examples of when digital forensics has been used successfully in the past, and how digital forensics can be used to determine what was compromised on a computer. He also touches on some digital forensic tools and methods of how to apply them.

Read more

Digital Forensics


Tiger: A Security Tool for UNIX Systems

Tiger is a set of scripts that scan a Unix system looking for security problems. It supports multiple UNIX platforms and is free to use. It can act as both a Host Intrusion Detection System and a Security Audit tool. Tiger compliments network IDS and kernel IDS. Tiger as a ...

Read more

Tiger is a set of scripts that scan a Unix system looking for security problems. It supports multiple UNIX platforms and is free to use. It can act as both a Host Intrusion Detection System and a Security Audit tool. Tiger compliments network IDS and kernel IDS. Tiger as a HIDS finds anything that slips past the NIDS.

As a HIDS, Tiger looks for suspicious processes, monitors host access, and monitors changes to critical system ...

Read more

Categories


Tags