Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Captive portal - Wikipedia

    en.wikipedia.org/wiki/Captive_portal

    A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources. Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license ...

  3. PacketFence - Wikipedia

    en.wikipedia.org/wiki/PacketFence

    Free and open-source software portal; PacketFence is an open-source network access control (NAC) system which provides the following features: registration, detection of abnormal network activities, proactive vulnerability scans, isolation of problematic devices, remediation through a captive portal, 802.1X, wireless integration and User-Agent / DHCP fingerprinting.

  4. List of router and firewall distributions - Wikipedia

    en.wikipedia.org/wiki/List_of_router_and...

    Free (PC) or hardware version. UTM distribution with routing, firewall, anti-spam and anti-virus for web, FTP and e-mail, OpenVPN, IPsec, captive portal functionality, and captive portal (missing in community version). Endian Firewall Community (EFW) is a complete version for x86. The anti-virus for EFW is Sophos or ClamAV.

  5. Network access control - Wikipedia

    en.wikipedia.org/wiki/Network_Access_Control

    Network access control is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. [3] NAC might integrate the automatic remediation process (fixing non-compliant nodes before allowing access ...

  6. Evil twin (wireless networks) - Wikipedia

    en.wikipedia.org/wiki/Evil_twin_(wireless_networks)

    One of the most commonly used attacks under evil twins is a captive portal. At first, the attacker would create a fake wireless access point that has a similar Essid to the legitimate access point. The attacker then might execute a denial-of-service attack on the legitimate access point which will cause it to go offline. From then on, clients ...

  7. tomato (firmware) - Wikipedia

    en.wikipedia.org/wiki/Tomato_(firmware)

    Tomato is a family of community-developed, custom firmware for consumer-grade computer networking routers and gateways powered by Broadcom chipsets. The firmware has been continually forked and modded by multiple individuals and organizations, with the most up-to-date fork provided by the FreshTomato project.

  8. IPFire - Wikipedia

    en.wikipedia.org/wiki/IPFire

    IPFire. IPFire is a hardened [3] open source Linux distribution that primarily performs as a router and a firewall; a standalone firewall system with a web-based management console for configuration. IPFire originally started as a fork of IPCop [4] and has been rewritten on basis of Linux From Scratch since version 2. [5]

  9. WiFiDog Captive Portal - Wikipedia

    en.wikipedia.org/wiki/WiFiDog_Captive_Portal

    The WiFiDog authentication server is a PHP and PostgreSQL or MySQL server based solution written to authenticate clients in a captive portal environment. WiFiDog Auth provides portal specific content management, allows users to create wireless internet access accounts using email access, provides gateway uptime statistics and connection specific and user log statistics.