Summary

We have just considered some of the most popular and widely used open source security tools available today. Although some of them might be used only for defense, others, such as Nessus and nmap, may also be used to attack. To avoid problems, you should never use these tools on or against others’ systems—unless you have their prior specific permission.

Get Solaris 8 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.