The security and sanctity of your Linux systems is of prime importance off late, especially with new and improved threats coming up from every nook and corner of the digital age. It is therefore essential to know and understand the various tools that exist out there to maintain the Linux system security.
Essentially used to prevent, detect and remove malicious computer viruses. Most of them also work well against other types of malware: browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, among others.
Essentially provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.
Essentially a process of encoding messages or information in such a way that only authorised parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor.
Essentially monitors network or system activities for malicious activities or policy violations and produces reports to a management station.
Essentially a network security system that controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted.
Essentially monitors a computer network for slow or failing components and notifies the network administrator (via email, SMS or other alarms) in case of outages.
Network Traffic Analyser
Essentially intercepts and examins messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted.
Essentially allows network administrators to probe firewall rule-sets and find entry points into a targeted system or network by manually generating packets to test network devices and behaviour.
Essentially designed to assess computers, computer systems, networks or applications for weaknesses.
Log File Analysers
Essentially used to make sense out of computer-generated records (also called log or audit trail records).
Essentially enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network.