finds you similar websites
auto-suggest    top sites

Jun 4th, 2024

11 Popular Sites Like Dshield

Our robot has explored the net and turned up a lot of striking security and internet sites like Dshield. Stop on by and explore other sites that are complementary to Dshield.

Displaying 71 to 80 of 500 alternatives to Dshield. (Updated: Jun 4th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Dshield:
  DShield - Distributed Intrusion Detection Sys...
SANS Internet Storm Center - A global cooperative cyber threat / internet ... Privacy Policy: privacy.html - Web Contact: info@dshield.org ...
http://www.dshield.org/
popularity:
security
internet
network
tools
sysadmin
intrusion
detection
firewall
computer
networking
new search by a custom tag signature
  Bro Intrusion Detection System - Bro Overview
Overview Features FAQ Download Manuals Email list Report a Bug Scan Visualization ... Bro detects intrusions by first parsing network traffic to extract its ...
similarity:
popularity:
security
ids
network
tools
opensource
software
networking
sysadmin
monitoring
unix
  Security Engineering - A Guide to Building Dependable Distributed Systems
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...
similarity:
popularity:
security
book
books
reference
engineering
network
computer
free
programming
ebook
  Darik's Boot and Nuke (Hard Drive Disk Wipe)
Self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, also prevents or thoroughly hinders all known techniques of hard disk forensic analysis.
similarity:
popularity:
security
software
tools
utilities
wipe
utility
erase
linux
sysadmin
computer
  B.I.S.S.
... see here -> http://www.bluetack.co.uk/forums/index.php?showforum=239 ... Flash malvertizement research thread in particular - http://www.bluetack.co.uk/forums ...
similarity:
popularity:
security
p2p
privacy
software
internet
tools
web
firewall
bittorrent
network
  The Metasploit Project
The Metasploit Framework is the open source penetration testing framework with the world's largest database of public, tested exploits.
similarity:
popularity:
security
hacking
tools
exploit
software
network
opensource
hack
exploits
linux
  Wireshark: Go deep.
Network protocol analyzer for Windows and Unix that allows examination of data from a live network, or from a capture file on disk.
similarity:
popularity:
network
security
tools
sniffer
software
networking
opensource
ethereal
wireshark
windows
  Computer Security Institute
Provides education on information security through conferences, classes, a newsletter, buyer's guide, customizable awareness newsletter, and industry reports.
similarity:
popularity:
security
internet
infosec
conferences
organization
hacking
technology
computer
education
csi
  BotHunter Software Distribution Page
Network monitoring tool recognizes the activity patterns of ... bothunter.net ... BotHunter - www.bothunter.net. Malware Threats - mtc.sri.com. Cyber-TA - www. ...
similarity:
popularity:
security
tools
software
malware
botnet
network
virus
windows
sysadmin
opensource
  CipherDyne: Linux Security, iptables Log Analysis, iptables Policy Analysis, and Intrusion Detection
Cipherdyne System and Network Security ... cipherdyne.org. Michael Rash, Security Researcher. Home. Blog Archives. Software. Author ...
similarity:
popularity:
security
linux
firewall
network
software
tools
iptables
netfilter
sysadmin
tool
  Project IP
In addition to your IP address projected above, Project IP ... projectip.com. The server that your browser is trying to connect to. ... © 2005-2009 ProjectIP.com ...
similarity:
popularity:
ip
security
tools
internet
browser
web
network
reference
privacy
computer
< prev 1 ... 6 7 8 9 10 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.