Search tips
  • The Metasploit Project
    Metasploit provides useful information to people who perform penetration testing, IDS signature development, and exploit research. This project was created to provide information on exploit techniques and to create a useful resource for exploit developers and security professionals. The tools and information on this site are provided for legal security research and testing purposes only. Metasploit is a community project managed by Metasploit LLC.
    in Public bookmarks with hack information mswindows security software unix
  • Track down your stolen laptop ā€“ Prey
    Prey helps you find your stolen laptop by sending timed reports to your email with a bunch of information of its whereabouts. This includes the general status of the computer, a list of running programs and active connections, fully-detailed network and wifi information, a screenshot of the running desktop and ā€” in case your laptop has an integrated webcam ā€” a picture of the thief.
    in Public bookmarks with assurance security software thief vol by 12 users
  • ZoneMinder: Linux Home CCTV and Video Camera Security with Motion Detection
    Welcome to ZoneMinder.com, home of ZoneMinder the top Linux video camera security and surveillance solution. ZoneMinder is intended for use in single or multi-camera video security applications, including commercial or home CCTV, theft prevention and child, family member or home monitoring and other domestic care scenarios such as nanny cam installations. It supports capture, analysis, recording, and monitoring of video data coming from one or more video or network cameras attached to a Linux system. ZoneMinder also support web and semi-automatic control of Pan/Tilt/Zoom cameras using a variety of protocols. It is suitable for use as a DIY home video security system and for commercial or professional video security and surveillance. It can also be integr...
    in Public bookmarks with advanced free linux professional security software surveillance video webcam by 4 users

« Previous
security from all users