What is a network security set?

tool network security (NST) is a set of free open applications for monitoring, analyzing and maintaining security in the computer network. NST comes as an international standardization organization (ISO) DISC image that contains its own, complete operating system, the highest open-source network security of applications used by security professionals and web user interfaces (WUI) to work with these tools. The disk image can be written on the optical disk, CD ROM or DVD ROM and introduced on most 32 -bit and 64 -bit computer systems based on the Intel 8086 (X86) (X86) (CPU) central unit.

As a separate network security system, it is based on the Fedora Linux operating system. NST uses many software packages included in Fedora Linux's standard distribution - including The Yellowdog Updater, Modified (YUM) Package Manager - also manage your operating system components also software packages for the application itselfCE network security. Although NST can be downloaded, burn to an optical disk and run, as it is called live distribution, this is not the only way to start or install a network security tool. Some installation methods provide benefits over others, depending on how the NST should be deployed and used.

As a live distribution, the network security set can be installed on an optical disk such as CD ROM or DVD ROM, or a portable universal serial bus (USB) Flash Drive, and then introduce or load into a random RAM (RAM). Although the LIVE method is very portable, it is unable to store information such as passwords or other stored data between relations, and any NST software updates are limited by the amount of RAM available. It is possible to set the persistent version of the NST on the USB Flash Drive, which is equally portable and retains security informationCE that were collected during the session and can then be converted to another computer for analysis. However, software updates are again limited. NST can also be installed in a fixed form on a computer's hard disk that ensures that data and easy updates are persisted, but are unable to move.

Another method for implementing a network security set is a virtual computer, a virtual computer running on an existing hardware computer system. The virtual machine can be set using a software system such as VMware, and NST can then be set in live mode or fixed mode. Either the virtual method carries the same benefits and shortcomings as their real counterparts, but it is no longer able to monitor wireless networks depending on the hardware where the virtual environment was created. The advantage of using a virtual computer to start Nstje that it can be configured to monitor not only the host computer's computer, but also any other virtual machines running onThis host, a method referred to as inline clicks. Many enterprise server software systems run on virtual machines for better hardware allocation, so NST can be used to monitor and analyze a large number of virtual servers very easily.

Any method for installation or startup is used a set of network security tools, most of its functionality cannot be fully utilized until the root password is reached when many NST services are launched. Once the NST is in operation, a detailed network analysis, diagnostics, monitoring and other safety forensic are capable of using its set of applications. Most applications are available via WUI, where the user can set the terminal server, monitor serial ports, map hosts and network services, follow the PATHS data packets from one host to anothehm, and more. NST also provides visualization for most of these features with a geolocating function that can determine the physical placement of hosts anywhere in the worldand view them in the image of the world map Mercator or via Google Earth ™.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?