Mike
Beaver's 2nd
Security Links Page
Firewalls
Home PC Firewall Guide
|
Platform |
Product |
Company |
Trial Available? |
Price |
Linux |
FrazierWall Linux |
Ken Frazier |
N/A |
Free |
Linux |
NetMax Firewall |
Cybernet Systems Corp. |
Onsite demo |
$139 |
Linux |
SecurPoint Firewall |
Securepoint Security
Solutions |
N/A |
Free |
Linux |
Sentry Firewall CD |
Sentry Network Security |
N/A |
Free |
Linux |
SmoothWall GPL |
SmoothWall Limited |
N/A |
Free |
Macintosh |
Firewall X2 |
Pliris |
Yes |
$35 |
Macintosh |
Impasse |
Glucose
Development Corp. |
Yes |
$10 |
Macintosh |
IPNetSentry |
Sustainable Softworks |
Yes |
$35 |
Macintosh |
NetBarrier |
Integro |
Yes |
$75 |
Macintosh |
Personal Firewall for Mac |
Symantec Corp. |
Yes |
$70 |
Windows |
Black ICE PC Protection |
Internet
Security Systems |
Yes |
$39 |
Windows |
McAfee Personal Firewall |
Network Associates |
Yes |
$30 annually |
Windows |
Sygate Personal Firewall |
SyGate
Technologies, Inc. |
N/A |
Free for pers. use; $20 for business
use |
Windows |
Tiny Personal Firewall |
Tiny Software, Inc. |
Yes |
$39 |
Windows |
Zone Alarm Pro |
Zone Labs, Inc. |
Yes |
$49 |
Windows |
Zone Alarm |
Zone Labs, Inc. |
Yes |
Free |
Windows |
Esafe |
Aladdin |
N/A |
Free |
Corporate Security Information Management & Firewall Software
netForensics |
e-Security |
NetIQ |
Secure Computing has,
supposedly, the world's most secure firewall and VPN gateway,
Sidewinder. |
Other Security Software
|
Disconnect
ZDNET's:
Firewalls
Tcp View
(sysinternals)
ZDNET'S: PC Security
Software
Microsoft Baseline Security Analyzer
The WhiteHat Aviator™ Web
Browser
All-in-One Security Suites: Chat Transcript (6/5/06: The Washington
Post) |
Heidi's: eraser
anti-keyloggers
A stash
of anti-hacking freeware.
Computer User's:
Naked on the Net
Active@ Kill Disk -
Hard Drive Eraser
SNORT FAQ tells you how
to use this application.
caleb15.com/intrusion
points to a collection of various software-based intrusion security
tools. |
EP Dump Scanner
lists the services your machine has made available on various ports
via Microsoft's DCOM protocol.
Avoid Aviator browser if you care about security and privacy, Google
warns: A public spat between WhiteHat Security and Google has
erupted over the open-source Aviator browser.(1/12/2015)
Site
Advisor - "since March McAfee has been offering a browser
plug-in that works with Mozilla Firefox and Microsoft Internet
Explorer. SiteAdvisor puts a little rectangular button in the bottom
corner of the browser. If a site you're visiting is safe, the
SiteAdvisor button stays green. When you visit a questionable Web
site the button turns red or yellow (depending on the risk level)
and a little balloon expands with details on why SiteAdvisor has
rated the site as such." (
The
Dangerous Side of Search Engines(5/26/06: The Washington Post))
Kaspersky's:
Anti-Viral Toolkit Pro
is THE best anti-virus software that I've ever used.
Tambu UDP Scrambler
- User Datagram Protocol (UDP) ports are one of the first points of
entry hackers look for. This not only acts as a fake UDP port, it
can also be used to cripple attackers' machines through a handy
program called UDP flooder. All kinds of other hacking/fighting back
tools are on this site. It is not recommended for use where this is
illegal.
Marty Roesch’s
Snort
is the
most popular open-source intrusion detection software. It "has
up-to-date intrusion detection (signature, etc.) rule files, a very
large and happy user base, free user support forums, and commercial
support service available. It allows installation with a MySQL
database as an option, allowing alerts and related information to
become accessible via ordinary SQL-related tools for user-defined
analysis. It can also be installed with an analysis tool called ACID
(Analysis Console for Intrusion Databases)."
"It allows installation
with a
MySQL
database as an option, allowing alerts and related information
to become accessible via ordinary SQL-related tools for user-defined
analysis. It can also be installed with an analysis tool called ACID
(Analysis Console for Intrusion Databases)."
|
Stalking Reports
FINDLAW's:
Resource list
for cyberstalking issues.
|
National Center for Victims of Crime's
state-by-state guide on stalking. |
Cyberstalking: What You Need to Know to Stay Safe Online |
Links Pages
|
Fraud Theft, Tax Evasion, Etc. Links
Google:
Computers
>
Security
>
Biometrics >
Diverse Resources |
Subseven News Index
about.com's:
Internet / Network Security |
Certification Materials, Sites
SANS GIAC
Certified Intrusion Detection Analyst Practical.doc
|
The
CISSP and SSCP Open Study Guides Web Site
Free, downloadable, CISSP and SSCP
Certification examination
study
guides |
SANS
GIAC Certified Intrusion Analyst (GCIA) Exam
Evaluating
Network Intrusion Detection Signatures, Pt. 1 |