Personal tools
Skip to content. | Skip to navigation
snmpcheck supports the following enumerations: * Contact * Description * Devices * Domain * Hardware and storage information * Hostname * IIS statistics * IP forwarding * Listening UDP ports * Location * Motd * Mountpoints * Network interfaces * Network services * Processes * Routing information * Software components (Windows programs or RPMs etc.) * System Uptime * TCP connections * Total Memory * Uptime * User accounts * Web server information (IIS)
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort has three primary uses. It can be used as a straight packet sniffer like tcpdump(1), a packet logger (useful for network traffic debugging, etc), or as a full blown network intrusion detection system. You MUST edit /etc/snort/snort.conf to configure snort before it will work! There are 5 different packages available. All of them require the base snort rpm (this one). Additionally, you may need to chose a different binary to install if you want database support. If you install a different binary package /usr/sbin/snort should end up being a symlink to a binary in one of the following configurations: plain Snort (this package, required) Please see the documentation in /usr/share/doc/snort-2.9.4 for more information on snort features and configuration.
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort has three primary uses. It can be used as a straight packet sniffer like tcpdump(1), a packet logger (useful for network traffic debugging, etc), or as a full blown network intrusion detection system. You MUST edit /etc/snort/snort.conf to configure snort before it will work! Please see the documentation in /usr/share/doc/snort-2.9.9.0 for more information on snort features and configuration.
Snort binary compiled with mysql support.
Snort binary compiled with postgresql support.
The goal of the SOAPpy team is to provide a full-featured SOAP library for Python that is very simple to use and that fully supports dynamic interaction between clients and servers.
Socat is a relay for bidirectional data transfer between two independent data channels. Each of these data channels may be a file, pipe, device (serial line etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU line editor (readline), a program, or a combination of two of these.