Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Linux News Today: Network Security Toolkit Is Now Based on Fedora 22, Powered by Linux Kernel 4.1.7

Posted on October 3, 2015

On October 3, the developers of the Network Security Toolkit (NST) open-source network monitoring and security analysis toolkit for Linux kernel-based operating systems announced the release of Network Security Toolkit 22-7248.

According to the release notes, Network Security Toolkit 22 SVN7248 is based on the latest Fedora 22 Linux operating system, and it’s powered by the long-term supported Linux 4.1.7 kernel. Of course, there are numerous under-the-hood improvements and bug fixes in the new Network Security Toolkit release.

Prominent features include new geolocation map presentation based on the latest WebGL Globe technologies, which can be used to render geolocated IPv4 addresses on a globe in a web browser, and support for populating the NST Networking Tools Widgets with results from various Network Security Toolkit integrated apps.

There’s now support for associating each NST Networking Tools Widget with a Storage Manager for saving and loading hostnames, IPv6, IPv4, and MAC addresses. Users will also be able to import and export the saved addresses and hostnames across multiple Network Security Toolkit systems.

“We are pleased to announce the latest NST release: ‘NST 22 SVN:7248.’ This release is based on Fedora 22 using Linux Kernel: ‘4.1.7-200.fc22.’ This release brings the NST distribution on par with Fedora 22,” reads the announcement. “As always, the networking and security applications included have been updated to their latest version.”

New Host Map Marker Cloning mapping tool added

In addition to the new features mentioned above, Network Security Toolkit 22-7248 comes with a new Host Map Marker Cloning mapping tool, an updated NST Network Interface Bandwidth Monitor 2 with support for Secure WebSockets, and the ability to manually control a network interface’s Promiscuous State via the nstnetcfg script.

There’s now support for the DNF package manger in NST WUI and its associated apps, support for decoding ANSI color in NST Shell Console, support for running standalone instances of the HTTPD service for NST WUI, and the addition of a brand new JavaScript-based NST WUI systemd widget.

Last but not least, the 64-bit edition of Network Security Toolkit includes the professional version of the ntopng software. Speaking of software, most of the included packages were updated to their latest versions available at the moment of writing this article. Download Network Security Toolkit 22-7248 right now from Softpedia.

Via Softpedia

Terbaru

  • Inilah Syarat Dokumen SSU ITB 2024-2026 yang Wajib Kalian Siapkan Supaya Nggak Gagal Seleksi Administrasi
  • Inilah Episyrphus Balteatus, Lalat Unik Penyamar yang Sangat Bermanfaat bagi Taman Kalian
  • Inilah Cara Lolos Seleksi Siswa Unggul ITB Lewat Jalur Tes Tulis Biar Jadi Mahasiswa Ganesha
  • Inilah Penemuan Fosil Hadrosaurus yang Ungkap Bahwa Penyakit Langka Manusia Sudah Ada Sejak Zaman Prasejarah
  • Inilah Penemuan Terbaru yang Mengungkap Bahwa Sunburn Ternyata Disebabkan Oleh Kerusakan RNA
  • Inilah Alasan Kenapa Manusia Lebih Sering Hamil Satu Bayi daripada Kembar Menurut Penelitian Terbaru
  • Inilah Syarat dan Cara Pendaftaran IMEI Internasional Mulai Mei 2026
  • Bocoran Spek Samsung Galaxy S27 Ultra Nih, Kamera 3X Hilang + Teknologi AI
  • Inilah Perbedaan Motorola G47 dan Motorola G45, Cuma Kamera 108 Megapiksel Doang?
  • Update Baru Google Gemini: Bisa Bikin File Word, PDF, Excel secara Otomatis
  • Rekomendasi Motor Listrik 2026 Anti Mogok!
  • Ini Loh Honda Vision 110, Motor Baru Seharga Beat & Rangka eSAF Khusus Pasar Eropa
  • Inilah Mobil-Mobil Paling Cocok Transisi ke Bioetanol E20 dan Biodiesel B50!
  • Inilah Ternyata Batas Minimal Daya Cas Mobil Listrik di Rumah
  • DJP Geser Batas Akhir Lapor Pajak Sampai 31 Mei 2026
  • PKB Tanggapi Dingin Usul Yusril Ihza Mahendra Soal Parliamentary Treshold 13 Kursi
  • LPTNU Kritik Keras Rencana Penutupan Prodi: Kenapa Tidak Komprehensi & Berbasis Problematika Nyata?
  • Gus Rozin PWNU Jawa Tengah Setuju Cak Imin, Konflik PBNU bikin Warga Kesal dan Tidak Produktif
  • Pengamat: Prabowo Harus Benahi KAI, Aktifkan juga Jalur Kereta Lama & Baru
  • Sekjend PBNU: Jadwal Muktamar Usulan PWNU Sejalan Hasil Rapat Pleno & Rais Aam
  • PKB Desak Hukuman Maksimal Kasus Little Aresha & Evaluasi Total Sistem Penitipan Anak secara Nasional
  • PKB Usul Modernisasi Sistem Kereta dan CCTV di Kabin Masinis, Setuju?
  • Menteri PPA Arifah Fauzi Minta Maaf Soal Polemik Pindah Gerbong Wanita di KRL
  • Cara Kirim Robux Mudah di Roblox Beli Skin Shirt Preview
  • Kronologi kasus dugaan penyebaran konten asusila oleh anak anggota DPRD Kutai Barat?
  • Inilah Alasan Kenapa Gelembung Air di Luar Angkasa Bisa Jadi Eksperimen Fisika yang Keren Banget
  • Inilah Contoh Naskah Doa Upacara Hardiknas 2026 yang Syahdu dan Penuh Makna
  • Inilah 10 Peringkat SMP di Daerah Istimewa Yogyakarta Berdasarkan Hasil TKA TKAD 2025/2026 Terbaru
  • Inilah Cara Download FF Beta Versi Terbaru 2026, Lengkap Dengan Cara Daftar Advanced Server Resmi
  • Inilah Cara Menghilangkan YouTube Shorts di Beranda Biar Nggak Menghambat Scrolling Kalian!
  • How to build a high-performance private photo cloud with Immich and TrueNAS SCALE
  • How to Build an Endgame Local AI Agent Setup Using an 8-Node NVIDIA Cluster with 1TB Memory
  • How to Master Windows Event Logs to Level Up Your Cybersecurity Investigations and SOC Career
  • How to Build Ultra-Resilient Databases with Amazon Aurora Global Database and RDS Proxy for Maximum Uptime and Performance
  • How to Build Real-Time Personalization Systems Using AWS Agentic AI to Make Every User Feel Special
  • How to Use DeepSeek V4 Pro for Insane Coding Performance
  • How to Deploy the NVIDIA CuOpt Supply Chain Agent for Rapid Optimization
  • How to Build Your Own AI Workforce with Ruflo
  • How to Run a Fully Multimodal AI Agent Locally for Free (Hermes Agent + Nemotron)
  • How to Manage AI Agents Like a Pro with OpenAI Symphony
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme