About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 59. Chapters: Rsync, Tor, Netfilter, OpenSSH, Virtual Network Computing, TinTin++, Psiphon, SolarWinds, OnTap, Zarafa, Syslog-ng, Qeep, Opsview, PacketTrap, Twisted, NetworkManager, JXTA, D-Bus, Pandora FMS, RealVNC, Wvdial, Plixer International, Fail2ban, OTRS, Social VPN, GnowSys, Avahi, Slirp, PvPGN, OSSEC, CopSSH, WhatsUp Gold, Unison, MTR, Point-to-Point Protocol daemon, Rsyslog, GPXE, DansGuardian, Wireless Nodes Database, TightVNC, DeleGate, DenyHosts, Dnsmasq, GLPI, IPXE, Ipswitch, Inc., Thinstation, ActionPacked! Networks, Sharelin, Turtle F2F, OpenAFS, Rdesktop, Stet, Cwrsync, Pound, Opentracker, Telepathy, Wicd, Privoxy, Etherape, Linux Virtual Server, VDownloader, Ipchains, Lsh, Suricata, Performance Co-Pilot, Sucuri, Farsight, Tahoe Least-Authority Filesystem, TPTEST, Switzerland, PeerTracker, QtdSync, Dropbear, Loginventory, Kppp, Hping, FreeRDP, Tsclient, Topsite Templating System, Science, Education and Learning in Freedom, Vinagre, N2n, Miredo, X2x, IStumbler, L7-filter, Panorama9, DeltaCopy, Ethtool, X2vnc, Netgraph, PyGopherd, Stone, CaLStats, Xrdp, SoftRay, YXORP, Balance, Arptables, Kdenetwork, Mii-tool, Molins. Excerpt: Tor is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user's location or usage from someone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity, including "visits to Web sites, online posts, instant messages and other communication forms," to the user. It is intended to protect users' personal freedom, privacy, and ability to conduct confidential business, by keeping their internet activities from being monitored. The software is open-source and the network is free of charge to use. An alpha version of the software, wit...