Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Captive portal - Wikipedia

    en.wikipedia.org/wiki/Captive_portal

    A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources. Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license ...

  3. List of router and firewall distributions - Wikipedia

    en.wikipedia.org/wiki/List_of_router_and...

    Free (PC) or hardware version. UTM distribution with routing, firewall, anti-spam and anti-virus for web, FTP and e-mail, OpenVPN, IPsec, captive portal functionality, and captive portal (missing in community version). Endian Firewall Community (EFW) is a complete version for x86. The anti-virus for EFW is Sophos or ClamAV.

  4. pfSense - Wikipedia

    en.wikipedia.org/wiki/PfSense

    pfSense is a firewall / router computer software distribution based on FreeBSD. The open source pfSense Community Edition (CE) and pfSense Plus is installed on a physical computer or a virtual machine to make a dedicated firewall/router for a network. [3] It can be configured and upgraded through a web-based interface, and requires no knowledge ...

  5. WiFiDog Captive Portal - Wikipedia

    en.wikipedia.org/wiki/WiFiDog_Captive_Portal

    Linux Journal reports that a working gateway install can be packaged in less than 15kB on an i386 platform. Authentication server. The WiFiDog authentication server is a PHP and PostgreSQL or MySQL server based solution written to authenticate clients in a captive portal environment. WiFiDog Auth provides portal specific content management ...

  6. Evil twin (wireless networks) - Wikipedia

    en.wikipedia.org/wiki/Evil_twin_(wireless_networks)

    Using captive portals. One of the most commonly used attacks under evil twins is a captive portal. At first, the attacker would create a fake wireless access point that has a similar Essid to the legitimate access point. The attacker then might execute a denial-of-service attack on the legitimate access point which will cause it to go offline ...

  7. Amazingports - Wikipedia

    en.wikipedia.org/wiki/Amazingports

    AmazingPorts is a Linux-based software product customized for use as a firewall, captive portal and billing system (Hotspots). The project started in 2001. Description. AmazingPorts is mainly deployed as an access control system in private and public networks.

  8. Zeroshell - Wikipedia

    en.wikipedia.org/wiki/Zeroshell

    Zeroshell. Zeroshell is a small open-source Linux distribution for servers and embedded systems which aims to provide network services. [1] [2] Its administration relies on a web-based graphical interface; no shell is needed to administer and configure it. Zeroshell is available as Live CD and CompactFlash images, and VMware virtual machines.

  9. PacketFence - Wikipedia

    en.wikipedia.org/wiki/PacketFence

    PacketFence. PacketFence is an open-source network access control (NAC) system which provides the following features: registration, detection of abnormal network activities, proactive vulnerability scans, isolation of problematic devices, remediation through a captive portal, 802.1X, wireless integration and User-Agent / DHCP fingerprinting.