Best Free and Open Source Software
-
8 Best Free and Open Source Network Intrusion Detection Systems - LinuxLinks
NIDS can be hardware or software-based systems and, depending on the manufacturer of the system, can attach to various network mediums such as Ethernet, FDDI, and others. This article focuses on software-based NIDS only (we will cover HIDS in a separate article).
NIDS can protect hundreds of computer systems from one network location. This helps make them a cost effective solution and easier to deploy than a HID. NIDs also provide a broader examination of a corporate network via scans and probes, and also protect devices such as firewalls, print servers, VPN concentrators and routers. Additional benefits include flexibility with multiple operating systems and devices, and protection against bandwidth floods and DoS attacks.
Here is our verdict on the finest software-based NIDS. We only include free and open source software. Maltrail is a half-way house between an intrusion detection system and a malware scanner.
Fern Wifi Cracker - wireless security auditing and attack software - LinuxLinks
Fern Wifi Cracker is a wireless security auditing and attack software program written using the Python programming language and the Python Qt GUI library.
The program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks.
The software is designed to be used in testing and discovering flaws in one’s own network with the aim of fixing the flaws detected.
This is free and open source software.
Concessio - understand file permissions - LinuxLinks
The Unix permission system is used to grant granulated access to files and directories. Permissions are granted to three groups: User (the owner of the file), Group (a group of users who share access to the file), and Others (all other users on the system).
The types of permission are: Read (view the file’s contents or listing a directory’s contents), Write (allows modifying the file’s contents or creating/deleting files within a directory), and Execute (allows running the file as a program).
Permissions can be represented symbolically or numerically. Symbolic permissions are represented as a string of 10 characters. Numeric permissions are represented by three numbers (octal notation).
This is free and open source software.
Tatlin - 3D STL and Gcode viewer - LinuxLinks
Using Tatlin, you can visualize, inspect and tweak your designs before and during the printing or machining processes. Taking advantage of hardware acceleration, the app efficiently renders complex models even on older systems. Designed for makers and hobbyists, Tatlin aims to provide a fast, portable and intuitive way to visualize and examine models and machine instructions with a minimal learning curve.
This is free and open source software.