Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Captive portal - Wikipedia

    en.wikipedia.org/wiki/Captive_portal

    A captive portal is a web page displayed to users of a Wi-Fi or wired network before they can access network resources. Learn how captive portals are used for authentication, marketing, and legal purposes, and how they can be detected and bypassed.

  3. pfSense - Wikipedia

    en.wikipedia.org/wiki/PfSense

    pfSense is a computer software distribution that can be installed on physical or virtual machines to create a dedicated firewall/router for a network. It has features such as traffic shaping, VPNs, captive portal, stateful firewall, and network address translation.

  4. List of router and firewall distributions - Wikipedia

    en.wikipedia.org/wiki/List_of_router_and...

    A comprehensive list of operating systems designed for use as routers and/or firewalls, with their status, type, architecture, license, cost and description. Includes Linux, FreeBSD and other distributions, such as Alpine Linux, IPFire, OPNsense, pfSense and more.

  5. Amazingports - Wikipedia

    en.wikipedia.org/wiki/Amazingports

    AmazingPorts is a Linux-based software product customized for use as a firewall, captive portal and billing system (Hotspots). The project started in 2001. Description. AmazingPorts is mainly deployed as an access control system in private and public networks.

  6. WiFiDog Captive Portal - Wikipedia

    en.wikipedia.org/wiki/WiFiDog_Captive_Portal

    WiFiDog was an open source solution for wireless hotspots, but it is no longer updated. It consists of a gateway and an authentication server, and it is included in OpenWrt software package.

  7. PacketFence - Wikipedia

    en.wikipedia.org/wiki/PacketFence

    PacketFence is an open-source network access control (NAC) system that provides registration, detection, isolation, remediation and integration features. It is developed by Inverse Inc., a subsidiary of Akamai Technologies, and supports Linux and Debian operating systems.

  8. Network access control - Wikipedia

    en.wikipedia.org/wiki/Network_Access_Control

    Network access control (NAC) is an approach to computer security that unifies endpoint security technology (such as antivirus) with network security enforcement. NAC aims to prevent non-compliant devices from accessing the network and to remediate them with quarantine or captive portals.

  9. Evil twin (wireless networks) - Wikipedia

    en.wikipedia.org/wiki/Evil_twin_(wireless_networks)

    An evil twin is a fraudulent Wi-Fi access point that eavesdrops on wireless communications and steals passwords. Learn how it works, see examples and references, and find related links.