Chapter 7. Open Source Security Tools

DURING THE PAST SEVERAL YEARS,THE FREE and open source software movement has demonstrated that good software can be free: free to use, modify, and redistribute. All the security tools described in this chapter are distributed in open source code form and may be used free of charge (subject to some restrictions specified in the corresponding licenses). Please note that these brief overviews do not replace the documentation nor the installation guidelines that come with the software. The software’s features and behavior are subject to change and updates, so be sure to check the version numbers and release ...

Get Solaris 8 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.