Nessus


Also found in: Dictionary, Thesaurus, Medical, Acronyms, Idioms, Wikipedia.

Nessus:

see HerculesHercules
, Heracles,
or Herakles
, most popular of all Greek heroes, famous for extraordinary strength and courage. Alcmene, wife of Amphitryon, made love to both Zeus and her husband on the same night and bore two sons, Hercules (son of Zeus) and Iphicles
..... Click the link for more information.
.
The Columbia Electronic Encyclopedia™ Copyright © 2013, Columbia University Press. Licensed from Columbia University Press. All rights reserved. www.cc.columbia.edu/cu/cup/

Nessus

A very popular vulnerability scanner from Tenable Network Security, Columbia, MD (www.tenable.com). Part of Tenable's SecurityCenter vulnerability management system, the Nessus scanner runs on Windows, Mac and a variety of Linux versions. For personal use on home networks, a HomeFeed license is available at no charge.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Tenable Research and Community: Receive Cyber Exposure alerts and join the Tenable community discussion from directly within Nessus Essentials for the latest information on plugins, major vulnerabilities and original reports plus a peer network for discussion and collaboration.
Peterson, "Using the Nessus Vulnerability Scanner on Control Systems," Digital Bond Inc, 2006.
"At last and best she thought of Nessus' shirt Still thick with blood and virulent as ever-- The perfect gift for Hercules to wear."
Especie: Fountainea nessus (Latr.), cantidad: 18 [male][male], procedencia, COLO MBIA: Caldas, Riosucio, 1700 m, VIII-2006, J.
Since the introduction of Nessus Cloud, Tenable continues to deliver choice and flexibility for customers who want to move some or all of their IT operations to the cloud, said Ron Gula, CEO, Tenable Network Security.
Nessus Agents, now with support for Mac OS X and Red Hat/CentOS Linux, address key challenges of traditional network-based scanning, and reduce an organization's attack surface by scanning assets that are off the network or powered-down during scheduled assessments.
"Determining where and how your business is vulnerable to Shellshock requires verifying that the patch was properly installed on the system, which is something Nessus and SecurityCenter CV do quite well."
In Sismondi's footnote, he cites Landolphe the Elder, "she [Stephania] wrapped him [Otho] in the poisoned hide of a stag, every bit as lethal as the robe of the centaur Nessus" (1:13m).
We surveyed vulnerability assessment tools, Metasploit [6], Nessus [7], and Modscan [8] for the classification of cyberattacks in SCADA networks.