tailieunhanh - Open Source Security Tools : Practical Guide to Security Applications part 30
Open Source Security Tools : Practical Guide to Security Applications part 30. Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. | Page 269 Thursday June 24 2004 9 54 PM The Birth of an Open Source Project 269 We also had to design a database schema with the tables that we would be populating with our program. The NPI program was a great help in this regard although there were new tables relating to our scheduling that we needed to add. While the dataflow was similar to that of NPI there were some significant differences. We diagramed this so we could follow all the logical interactions between the systems. Figure shows the logical layout of NCC. We also created a Web site and a Sourceforge page for the project. The Web page is located at ncc. While we figured we had enough talent in our group to finish the project it never hurts to let other people in the open source community know what you are working on. Also once it was finished we would need help in porting it to other platforms and adding new features. So once all the preliminaries were taken care of we got to work usually holding weekly meetings to track the progress. Because this was not a full-time effort and we all had day jobs it took about a year to complete the program and even that was only a beta version. Still we had something we could use and now by leveraging the online community of developers NCC can be extended and improved. Writing NCC as an open source NCC MySQL Database MySQL Database MySQL Database Queries Groups Companies Users Targets Schedules Queries Queries Checks database loads queue Nessus scans Target network Nessus servers PHP Front End PHP Web server NCC Client Checks queue runs scans posts results Nessus servers Target network Target network The program module queries the database and places scheduled scans in the queue. The NCC client takes events out of the queue sends the User with scan commands to the Nessus Web browser server s and posts the results. The NCC front end allows viewing of the results through a standard Web browser. Figure NCC .
đang nạp các trang xem trước