Hello Amit,

On Thu, Mar 24, 2011 at 8:24 AM, Amit Pal <[email protected]> wrote:

> Hello ,
>
> Another tip: checkout Network Scanner and Network Web Scanner, and see what
> kind of tools, we already have. Thus, you will build a better proposal.
>
> Thanks for the tip, I am totally impressed with this UMIT functionality
> specially  features like :
> Multi Tab ,
> Multi scan ,
> Scheduling ,
> comparing the result
>

I think you forgot to point out or to checkout more 2 functionalities:

   - Topology
   - Network Inventory

:)


>
> I also saw the UMIT_webscanner Mock up (template.html) and got some idea
> also for my Mock up.
>

Nowadays, Network Web Scanner is much more than a prototype. You can run it,
just checkout the code:

svn co http://svn.umitproject.org/svnroot/umit/network-scanner-web/trunk




>
> So it is obvious to put feature in this remote UMIT scanner which is
> already present in the UMIT_WEB Scanner.But somehow i have doubt about the
> scanning feature Application hosted over cloud.If some one want to scan  the
> host machine which is running over on cloud.According to the documentation
> it will search the nearby host but my point is cloud is globally how much he
> can search the host : )
>

I didn't get. The machines could be everywhere. Could you give me a better
explanation?


>
> I am going to my college and it is 14hrs journey but in between i will
> understand the code of netwrok scanner and network web scanner (just
> downloaded from svn) and give update to you .But  for the testing purpose i
> just create a  PHP portal which are scanning  my computer (host machine )
> successfully  and telling me the open ports.
>

Yes, but such things are already done in Umit Web, so actually, we're
looking for features like Network Inventory into Web Scanner.
Good luck with your journey.


>
> And i got a point for security purpose there is a layer has been invented
> which works between the application and transport layer i.e. TSL we can use
> this layer over on cloud i don't know yet that UMIT are using this layer or
> not.I am just telling my point of view.
>

Of course, the communication should use TLS. Although it is easier to
implement, I'm glad that you point out this detail.


>
> There are also some software which can block to run the port scanner on his
> machine my suggestion is that we can add some vector data to the
> information(data is going to the host machine) and the vector data will vary
> to every after information.WIFI system using this vector data .and this
> functionality can also be use vice-versa.
>

Software that can block to run the port scanner on his machine? Access
restriction? How you plan to solve this problem?


>
> Waiting for your feedback.
>
> Amit Pal
>
>
> ------------------------------------------------------------------------------
> Enable your software for Intel(R) Active Management Technology to meet the
> growing manageability and security demands of your customers. Businesses
> are taking advantage of Intel(R) vPro (TM) technology - will your software
> be a part of the solution? Download the Intel(R) Manageability Checker
> today! http://p.sf.net/sfu/intel-dev2devmar
> _______________________________________________
> Umit-devel mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/umit-devel
>
>
Your questions are very relavant.

I'm look forward to hearing more details :)

Best Regards,
-- 
Luís A. Bastião Silva
Skype: koplabs
http://www.bastiao.org
------------------------------------------------------------------------------
Enable your software for Intel(R) Active Management Technology to meet the
growing manageability and security demands of your customers. Businesses
are taking advantage of Intel(R) vPro (TM) technology - will your software 
be a part of the solution? Download the Intel(R) Manageability Checker 
today! http://p.sf.net/sfu/intel-dev2devmar
_______________________________________________
Umit-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/umit-devel

Reply via email to