lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4582E337.2000005@soleranetworks.com>
Date:	Fri, 15 Dec 2006 11:02:31 -0700
From:	"Jeff V. Merkey" <jmerkey@...eranetworks.com>
To:	linux kernel <linux-kernel@...r.kernel.org>
Subject: [ANNOUNCE] Open Source Protocol Reconstruction Project for Linux

We have open sourced this project for our Linux based appliances and 
file systems.  Anyone from Linux
who wants to help port the program from Windows to Linux is welcome.  
The program supports
all native Linux forensics applications and formats.  The program 
reconsutructs web session and
email, and we are adding FTP, P2P, and other Linux kernel protocols. 

Jeff

     LINDON, Utah, Dec. 15 /PRNewswire/ -- Solera Networks, Inc., the
technology leader in network packet record and playback appliances, today
announced that source code for DataEcho, a web session reconstruction
application, will be made available under the GNU General Public License.
The company has established a community website at
http://sourceforge.net/projects/data-echo. Source code and Windows
installers are available for download now.
    DataEcho reconstructs historical web browsing and email traffic from
captured network packets, for monitoring insider security threats and
policy compliance. It is a useful adjunct to network protocol analyzers
such as Sniffer(TM) or WireShark.
    


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ