Computer Security Tools
Other network tools include:
- Honey Pots - Used to fool a hacker into believing that a target exists which really does not exist. It may be uset to keep a hacker in a virtual environment which does not really exist as a means of caputer or to prevent the attacker from attacking a real target.
- Utilities that can be used to analyze log files - Makes administrator jobs easire by scanning log files to locate attempted unauthorized entry or suspicious activity.
- Network Sniffers - Can be used to sniff and log network traffic which can help administrators find traffic on the network which may be suspicious or contain information which should be encrypted.
- Bandwidth Testers - Tests the available bandwidth across certain network lines or between two points on your network.
- Password cracking programs - Programs that take an encrypted or hashed value of a password and guess at the password until they find the unencrypted password.
No comments:
Post a Comment