TOP LEVEL CATEGORIES
EXPLORE
@chipongue
Favorites 0
Views 0
Monitoring of WordPress updates. WordPress is a Content management tool (CMS) designed to facilitate the creation and robust administration of websites, blogs or applications, ensuring…
Monitoring of SSL/TLS configurations. Secure Sockets Layer (SSL) is a cryptographic protocol designed to ensure authenticity, confidentiality and integrity in the exchange of data between…
Monitoring of ports of communication. Port of communication is a number identifying the application to which the data of communication is destined. In this way,…
Vulnerability monitoring. Web A vulnerability is a defect that can be exploited by an attacker aiming to subvert security policy, and may exist for several…
File and/or directorial monitoring. Files are groupings of records that follow a structural rule, and may contain data, documents, or programs, stored in a board,…
Monitoring of DNSSEC configurations. Domain Name Server Security Extension (DNSSEC) adds security to DNS protocol by providing authentication to DNS traffic, using asymmetric encryption to…
Blacklists are one of the most popular tools to combat the growing problem of spam and phishing attempts by using the email. These lists are…
Monitoring of correspondence between domain names and IP address associated Domain name is a name associated with a physical IP address on the Internet, easy…
Monitoring Web pages content A Web page, is any document that is part of a site on the Internet, usually in HTML format and with…
Monitoring of DDoS SYN flood attacks is a type of denial of service or distributed denial of service (DDoS) attack, which consists of direct overhead…
Programs or applications are executable files that are responsible for performing predefined tasks. On the Linux platforms these files exist the hundreds, and can vary…
Apache is one of the most popular open-source HTTP server, whose main function is to process among other requests the hyper-Text Transfer Protocol (HTTP). When…