Most security professionals are probably very comfortable with using open source tools to implement technical security functionality. From nikto to snort to openssh -- there are literally hundreds of well-known, sophisticated, open source tools that perform useful and critical security functions.



Source: http://ectnews.com.feedsportal.com/c/34520/f/632000/s/21a82b11/l/0L0Stechnewsworld0N0Crsstory0C757130Bhtml/story01.htm
Grace Park Gretha Cavazzoni Gwen Stefani Halle Berry
No comments:
Post a Comment