Enterprise-grade defensive security tool for Parrot OS with comprehensive monitoring, threat detection, and vulnerability scanning capabilities.
Developed by DevMonix Technologies (www.devmonix.io)
NORD Security System provides real-time monitoring, vulnerability scanning, and security event logging to help protect your system from various threats.
- π Complete Installation Guide
- π Comprehensive Usage Examples
- π§ Detailed Troubleshooting Section
- π Advanced Debugging Techniques
- β‘ Performance Optimization Tips
- Operating System: Parrot OS (Home/Security editions)
- Python Version: 3.8 or higher
- RAM: Minimum 2GB, Recommended 4GB+
- Disk Space: 100MB for installation, 1GB+ for logs
- Permissions: User or sudo access
# 1. Navigate to the NORD directory
cd nord
# 2. Run the automated setup script
./setup_commands.sh
# 3. Restart your terminal or source bash configuration
source ~/.bashrc
# 4. Verify installation
nord --help# 1. Install system dependencies
sudo apt update
sudo apt install python3 python3-pip python3-psutil python3-notify2
# 2. Install Python dependencies
pip3 install -r requirements.txt --user
# 3. Create installation directory
mkdir -p ~/.local/nord_security
# 4. Copy files
cp nord.py ~/.local/nord_security/
cp welcome.py ~/.local/nord_security/
cp nord_gui.py ~/.local/nord_security/
# 5. Create command symlinks
mkdir -p ~/.local/bin
ln -sf ~/.local/nord_security/nord.py ~/.local/bin/nord
ln -sf ~/.local/nord_security/welcome.py ~/.local/bin/nord-welcome
# 6. Make scripts executable
chmod +x ~/.local/bin/nord ~/.local/bin/nord-welcome
# 7. Add to PATH (if not already there)
echo 'export PATH="$HOME/.local/bin:$PATH"' >> ~/.bashrc
source ~/.bashrc# 1. Run as root for system-wide installation
sudo ./install.sh
# 2. Enable systemd service (optional)
sudo systemctl enable nord
sudo systemctl start nord
# 3. Verify service status
sudo systemctl status nord# Test basic functionality
nord --help
nord-welcome
nord status
# Check configuration
nord config
# Run initial scan
nord scan --no-banner# Verify Python installation
python3 --version
# Check required packages
python3 -c "import psutil, json, subprocess, sys; print('Dependencies OK')"
# Verify PATH configuration
which nord
which nord-welcome# Show all available commands
nord --help
# Show help with specific action
nord start --help# Quick status check
nord status
# Detailed status without banner
nord status --no-banner
# Status with verbose output
nord status --verbose# Start monitoring in foreground
nord start
# Start monitoring with verbose output
nord start --verbose
# Start monitoring without banner
nord start --no-banner
# Start monitoring with both options
nord start --verbose --no-banner# Quick vulnerability scan
nord scan
# Detailed scan with verbose output
nord scan --verbose
# Silent scan (no banner)
nord scan --no-banner# Generate security report
nord report
# Generate report with verbose output
nord report --verbose
# Silent report generation
nord report --no-banner# Show configuration file location
nord config
# Edit configuration (opens in default editor)
nord config --edit # (if implemented)
# Reset configuration to defaults
nord config --reset # (if implemented)# Start monitoring in background
nohup nord start --no-banner > /dev/null 2>&1 &
# Check if monitoring is running
ps aux | grep nord
# Stop background monitoring
pkill -f "nord.py start"# Enable automatic startup
sudo systemctl enable nord
# Start service
sudo systemctl start nord
# Check service status
sudo systemctl status nord
# View service logs
sudo journalctl -u nord -f
# Stop service
sudo systemctl stop nord
# Disable automatic startup
sudo systemctl disable nord# View recent security events
tail -f ~/.nord_security/logs/security_events.json
# View daily logs
tail -f ~/.nord_security/logs/nord_$(date +%Y%m%d).log
# Search logs for specific events
grep "HIGH" ~/.nord_security/logs/security_events.json
# Clean old logs (older than 30 days)
find ~/.nord_security/logs -name "*.log" -mtime +30 -delete# Launch graphical interface
python3 nord_gui.py
# Launch GUI in background
python3 nord_gui.py &
# GUI with specific configuration
python3 nord_gui.py --config ~/.nord_security/custom_config.json#!/bin/bash
# daily_security_check.sh
echo "π‘οΈ Running daily security check..."
# Update system
sudo apt update
# Run NORD vulnerability scan
nord scan --no-banner
# Generate daily report
nord report --no-banner
# Check system status
nord status --no-banner
# Show recent high-priority events
echo "π¨ Recent High-Priority Events:"
grep "HIGH" ~/.nord_security/logs/security_events.json | tail -5
echo "β
Daily security check completed!"#!/bin/bash
# server_monitoring_setup.sh
# Configure for server environment
cat > ~/.nord_security/config.json << EOF
{
"monitoring": {
"network_monitoring": true,
"process_monitoring": true,
"file_integrity": true,
"port_monitoring": true,
"log_monitoring": true
},
"thresholds": {
"suspicious_connections": 50,
"failed_logins": 10,
"cpu_usage": 90,
"memory_usage": 90,
"disk_usage": 85
},
"alerts": {
"email_enabled": true,
"email_address": "[email protected]",
"desktop_notifications": true,
"log_level": "INFO"
},
"whitelist": {
"trusted_ips": ["127.0.0.1", "::1", "10.0.0.0/8"],
"trusted_processes": ["systemd", "sshd", "nginx", "apache2"],
"excluded_dirs": ["/proc", "/sys", "/dev", "/tmp"]
}
}
EOF
# Start monitoring as service
sudo systemctl enable nord
sudo systemctl start nord
echo "π₯οΈ Server monitoring configured and started!"#!/bin/bash
# dev_environment_setup.sh
# Developer-friendly configuration
cat > ~/.nord_security/config.json << EOF
{
"monitoring": {
"network_monitoring": true,
"process_monitoring": false,
"file_integrity": true,
"port_monitoring": true,
"log_monitoring": false
},
"thresholds": {
"suspicious_connections": 20,
"failed_logins": 5,
"cpu_usage": 80,
"memory_usage": 85,
"disk_usage": 90
},
"alerts": {
"email_enabled": false,
"email_address": "",
"desktop_notifications": true,
"log_level": "WARNING"
},
"whitelist": {
"trusted_ips": ["127.0.0.1", "::1"],
"trusted_processes": ["code", "node", "python3", "npm", "yarn"],
"excluded_dirs": ["/proc", "/sys", "/dev", "/tmp", "node_modules"]
}
}
EOF
echo "π» Development environment configured!"Symptoms:
$ nord --help
bash: nord: command not foundCauses:
- PATH not configured correctly
- Symlinks not created
- Setup script not executed
Solutions:
# 1. Run setup script
./setup_commands.sh
# 2. Source bash configuration
source ~/.bashrc
# 3. Restart terminal
# Close and reopen terminal
# 4. Manual PATH setup
export PATH="$HOME/.local/bin:$PATH"
echo 'export PATH="$HOME/.local/bin:$PATH"' >> ~/.bashrc
# 5. Verify installation
which nord
ls -la ~/.local/bin/nordSymptoms:
$ ./setup_commands.sh
bash: ./setup_commands.sh: Permission deniedCauses:
- Script not executable
- File permission issues
Solutions:
# 1. Make script executable
chmod +x setup_commands.sh
chmod +x install.sh
chmod +x nord.py
# 2. Run with proper permissions
./setup_commands.sh
# 3. Check file permissions
ls -la *.sh *.py
# 4. If still issues, run with sudo
sudo ./install.shSymptoms:
$ python3 nord.py start
ModuleNotFoundError: No module named 'psutil'Causes:
- Required Python packages not installed
- Virtual environment issues
- Python path problems
Solutions:
# 1. Install system packages
sudo apt update
sudo apt install python3-pip python3-psutil python3-notify2
# 2. Install Python dependencies
pip3 install -r requirements.txt --user
# 3. Check Python installation
python3 --version
python3 -c "import sys; print(sys.path)"
# 4. Verify packages
python3 -c "import psutil, json, subprocess; print('Dependencies OK')"
# 5. If pip issues, try alternative
sudo apt install python3-psutil
python3 -m pip install psutil --userSymptoms:
$ pip3 install -r requirements.txt
error: externally-managed-environmentCauses:
- Python environment managed by system package manager
- PEP 668 restrictions
Solutions:
# 1. Use system packages
sudo apt install python3-psutil python3-notify2
# 2. Use pip with --break-system-packages (not recommended)
pip3 install -r requirements.txt --break-system-packages --user
# 3. Create virtual environment
python3 -m venv ~/.nord_venv
source ~/.nord_venv/bin/activate
pip install -r requirements.txt
# 4. Use pipx (if available)
pipx install psutilSymptoms:
$ nord status
Log directory: /home/user/.nord_security/logs
Error: Log directory not foundCauses:
- Configuration directory not created
- Permission issues
- First run not completed
Solutions:
# 1. Create directories manually
mkdir -p ~/.nord_security/logs
mkdir -p ~/.nord_security/config
# 2. Set proper permissions
chmod 755 ~/.nord_security
chmod 755 ~/.nord_security/logs
# 3. Run initial configuration
nord config
# 4. Test with verbose output
nord status --verboseSymptoms:
$ nord start
# No notifications appear for security eventsCauses:
- Notification daemon not running
- Missing notify2 library
- Desktop environment issues
Solutions:
# 1. Install notification components
sudo apt install libnotify-bin notify-osd
pip3 install notify2 --user
# 2. Start notification daemon
killall notify-osd
notify-osd &
# 3. Test notifications
python3 -c "import notify2; notify2.init('Test'); notify2.Notification('Test', 'Message').show()"
# 4. Check if notifications enabled in config
grep "desktop_notifications" ~/.nord_security/config.jsonSymptoms:
$ nord start
# System becomes slow, high CPU usageCauses:
- Aggressive monitoring settings
- System resource thresholds too low
- Background processes interference
Solutions:
# 1. Check current resource usage
top -p $(pgrep -f nord.py)
# 2. Adjust monitoring frequency
# Edit ~/.nord_security/config.json
# Increase check intervals or disable some monitoring
# 3. Use less intensive configuration
cat > ~/.nord_security/config.json << EOF
{
"monitoring": {
"network_monitoring": true,
"process_monitoring": false,
"file_integrity": false,
"port_monitoring": true,
"log_monitoring": false
},
"thresholds": {
"suspicious_connections": 50,
"failed_logins": 10,
"cpu_usage": 95,
"memory_usage": 95,
"disk_usage": 90
}
}
EOF
# 4. Monitor with verbose output to identify issue
nord start --verboseSymptoms:
$ sudo systemctl start nord
Job for nord.service failedCauses:
- Systemd service file issues
- Permission problems
- Configuration errors
Solutions:
# 1. Check service status
sudo systemctl status nord
# 2. View service logs
sudo journalctl -u nord -n 50
# 3. Check service file
sudo cat /etc/systemd/system/nord.service
# 4. Reload systemd daemon
sudo systemctl daemon-reload
# 5. Test manual start
sudo -u nord nord start --verbose
# 6. Check if user exists
sudo useradd -r -s /bin/false nord 2>/dev/null || echo "User exists"Symptoms:
$ nord status
Error: Invalid configuration fileCauses:
- JSON syntax errors
- Missing required fields
- Incorrect data types
Solutions:
# 1. Validate JSON syntax
python3 -m json.tool ~/.nord_security/config.json
# 2. Reset to default configuration
mv ~/.nord_security/config.json ~/.nord_security/config.json.backup
nord config # This will create a new default config
# 3. Manual configuration check
cat ~/.nord_security/config.json | python3 -c "import json, sys; json.load(sys.stdin)"
# 4. Use template configuration
cp config.template.json ~/.nord_security/config.jsonSymptoms:
$ nord start
# Constant alerts for normal system activityCauses:
- Threshold values set too low
- Whitelist not configured properly
- System-specific activity patterns
Solutions:
# 1. Review current thresholds
grep -A 10 "thresholds" ~/.nord_security/config.json
# 2. Adjust thresholds for your system
# Edit ~/.nord_security/config.json and increase values
# 3. Add system-specific items to whitelist
# Update trusted_ips, trusted_processes, excluded_dirs
# 4. Monitor system baseline
# Run nord status for a while to see normal activity patterns
# 5. Use verbose mode to understand triggers
nord start --verbose 2>&1 | grep "ALERT"# View all recent logs
tail -n 100 ~/.nord_security/logs/nord_$(date +%Y%m%d).log
# Monitor logs in real-time
tail -f ~/.nord_security/logs/nord_$(date +%Y%m%d).log
# Search for errors in logs
grep -i "error\|exception\|traceback" ~/.nord_security/logs/*.log
# Find specific event types
grep "NETWORK_SUSPICIOUS\|HIGH_CPU" ~/.nord_security/logs/security_events.json
# Analyze log patterns
awk '{print $1" "$2}' ~/.nord_security/logs/nord_*.log | sort | uniq -c | sort -nr# Export security events for analysis
python3 -c "
import json
with open('~/.nord_security/logs/security_events.json', 'r') as f:
events = [json.loads(line) for line in f]
# Count events by severity
severity_counts = {}
for event in events:
severity = event.get('severity', 'UNKNOWN')
severity_counts[severity] = severity_counts.get(severity, 0) + 1
print('Event Summary:')
for severity, count in sorted(severity_counts.items()):
print(f' {severity}: {count}')
"
# Find recent high-priority events
python3 -c "
import json, datetime
with open('~/.nord_security/logs/security_events.json', 'r') as f:
events = [json.loads(line) for line in f]
recent_high = [e for e in events
if e.get('severity') in ['HIGH', 'CRITICAL']
and datetime.datetime.fromisoformat(e['timestamp']) > datetime.datetime.now() - datetime.timedelta(hours=24)]
print('Recent High-Priority Events (24h):')
for event in recent_high[-5:]:
print(f' {event[\"timestamp\"]}: {event[\"event_type\"]} - {event[\"description\"]}')
"# Monitor NORD process performance
while true; do
echo "$(date): $(ps aux | grep '[n]ord.py' | awk '{print $3, $4}')"
sleep 5
done
# Check memory usage over time
python3 -c "
import psutil, time, json
nord_processes = [p for p in psutil.process_iter() if 'nord.py' in ' '.join(p.cmdline())]
if nord_processes:
p = nord_processes[0]
print(f'PID: {p.pid}')
print(f'CPU: {p.cpu_percent()}%')
print(f'Memory: {p.memory_info().rss / 1024 / 1024:.1f} MB')
print(f'Threads: {p.num_threads()}')
else:
print('NORD process not found')
"
# Disk usage analysis
du -sh ~/.nord_security/logs/*
find ~/.nord_security/logs -name "*.json" -exec wc -l {} \;# Start with maximum verbosity
nord start --verbose 2>&1 | tee nord_debug.log
# Monitor specific components
nord start --verbose 2>&1 | grep -E "(Network|Process|Port)"
# Debug configuration loading
nord config --verbose 2>&1
# Debug vulnerability scanning
nord scan --verbose 2>&1 | tee scan_debug.log# Test network monitoring only
python3 -c "
from nord import NordSecurity
nord = NordSecurity()
nord.config['monitoring']['network_monitoring'] = True
nord.config['monitoring']['process_monitoring'] = False
nord.config['monitoring']['port_monitoring'] = False
nord.config['monitoring']['file_integrity'] = False
nord.config['monitoring']['log_monitoring'] = False
nord.start_monitoring()
"
# Test specific vulnerability checks
python3 -c "
from nord import NordSecurity
nord = NordSecurity()
nord.run_vulnerability_scan()
"# Start Python debugger
python3 -m pdb nord.py start
# Breakpoint debugging
python3 -c "
import pdb
from nord import NordSecurity
pdb.set_trace()
nord = NordSecurity()
nord.start_monitoring()
"# Check file permissions
find ~/.nord_security -type f -exec ls -la {} \;
# Test write permissions
touch ~/.nord_security/logs/test_write.log && rm ~/.nord_security/logs/test_write.log
# Check process capabilities
ps aux | grep nord
cat /proc/$(pgrep -f nord.py)/status
# Test network access
python3 -c "import socket; s = socket.socket(); s.connect(('8.8.8.8', 53)); print('Network OK'); s.close()"# Complete dependency check
python3 -c "
import sys
required_modules = ['psutil', 'json', 'subprocess', 'threading', 'datetime', 'logging', 'os', 'time']
missing = []
for module in required_modules:
try:
__import__(module)
print(f'β {module}')
except ImportError:
missing.append(module)
print(f'β {module}')
if missing:
print(f'Missing modules: {missing}')
else:
print('All dependencies satisfied')
"
# Check system commands
commands = ['netstat', 'ss', 'lsof', 'ps', 'uptime', 'df']
for cmd in commands:
if subprocess.run(['which', cmd], capture_output=True).returncode == 0:
print(f'β {cmd}')
else:
print(f'β {cmd}')
"# Check environment variables
env | grep -E "(PATH|PYTHON|HOME|USER)"
# Check Python environment
python3 -c "
import sys, os
print('Python executable:', sys.executable)
print('Python version:', sys.version)
print('Python path:', sys.path[:3])
print('Current user:', os.getlogin())
print('Home directory:', os.path.expanduser('~'))
print('Current directory:', os.getcwd())
"
# Check system resources
python3 -c "
import psutil
print(f'CPU cores: {psutil.cpu_count()}')
print(f'Memory total: {psutil.virtual_memory().total / 1024**3:.1f} GB')
print(f'Disk usage: {psutil.disk_usage(\"/\").percent}%')
print(f'Network interfaces: {list(psutil.net_if_addrs().keys())}')
"#!/bin/bash
# nord_health_check.sh
echo "π₯ NORD Security System Health Check"
echo "====================================="
# Check installation
echo "π¦ Installation Status:"
if command -v nord >/dev/null 2>&1; then
echo "β NORD command available"
else
echo "β NORD command not found"
fi
# Check dependencies
echo -e "\nπ Dependencies:"
python3 -c "
import sys
deps = ['psutil', 'json', 'subprocess', 'threading']
for dep in deps:
try:
__import__(dep)
print(f'β {dep}')
except ImportError:
print(f'β {dep}')
"
# Check configuration
echo -e "\nβοΈ Configuration:"
if [ -f ~/.nord_security/config.json ]; then
echo "β Configuration file exists"
if python3 -m json.tool ~/.nord_security/config.json >/dev/null 2>&1; then
echo "β Configuration JSON valid"
else
echo "β Configuration JSON invalid"
fi
else
echo "β Configuration file missing"
fi
# Check directories
echo -e "\nπ Directories:"
for dir in ~/.nord_security ~/.nord_security/logs ~/.nord_security/config; do
if [ -d "$dir" ]; then
echo "β $dir exists"
else
echo "β $dir missing"
fi
done
# Check recent activity
echo -e "\nπ Recent Activity:"
if [ -f ~/.nord_security/logs/security_events.json ]; then
event_count=$(wc -l < ~/.nord_security/logs/security_events.json)
echo "β $event_count security events logged"
else
echo "β No security events found"
fi
echo -e "\nπ Health check completed!"#!/bin/bash
# nord_performance_monitor.sh
echo "π NORD Performance Monitor"
echo "=========================="
# Monitor for 60 seconds
for i in {1..12}; do
echo "$(date '+%H:%M:%S'):"
if pgrep -f "nord.py" >/dev/null; then
pid=$(pgrep -f "nord.py")
cpu=$(ps -p $pid -o %cpu --no-headers)
mem=$(ps -p $pid -o %mem --no-headers)
echo " CPU: ${cpu}% | Memory: ${mem}%"
else
echo " NORD not running"
fi
sleep 5
done# 1. Optimize monitoring intervals
# Edit ~/.nord_security/config.json
{
"monitoring": {
"check_interval": 5, // Increase from 1 to 5 seconds
"network_timeout": 2, // Reduce network check timeout
"process_sample_size": 50 // Limit process monitoring sample
}
}
# 2. Disable unnecessary monitoring features
{
"monitoring": {
"network_monitoring": true,
"process_monitoring": false, // Disable if not needed
"file_integrity": false, // Resource intensive
"port_monitoring": true,
"log_monitoring": false // Disable if not needed
}
}
# 3. Optimize thresholds to reduce false positives
{
"thresholds": {
"suspicious_connections": 50, // Increase from 10
"failed_logins": 15, // Increase from 5
"cpu_usage": 90, // Increase from 80
"memory_usage": 90, // Increase from 85
"disk_usage": 95 // Increase from 90
}
}# 1. Set process priority
# Edit nord_service or use nice command
nice -n 10 nord start
# 2. Limit memory usage
# Add to configuration
{
"performance": {
"max_memory_mb": 256,
"max_cpu_percent": 50,
"gc_interval": 300
}
}
# 3. Optimize I/O operations
{
"logging": {
"buffer_size": 8192,
"flush_interval": 10,
"rotate_size_mb": 10
}
}# 1. Network-only monitoring (lightweight)
{
"monitoring": {
"network_monitoring": true,
"process_monitoring": false,
"file_integrity": false,
"port_monitoring": false,
"log_monitoring": false
}
}
# 2. Security-focused monitoring
{
"monitoring": {
"network_monitoring": true,
"process_monitoring": true,
"file_integrity": true,
"port_monitoring": true,
"log_monitoring": false
},
"thresholds": {
"suspicious_connections": 20,
"failed_logins": 5,
"cpu_usage": 95,
"memory_usage": 95
}
}
# 3. Development environment (minimal impact)
{
"monitoring": {
"network_monitoring": true,
"process_monitoring": false,
"file_integrity": false,
"port_monitoring": true,
"log_monitoring": false
},
"alerts": {
"desktop_notifications": false,
"log_level": "ERROR"
}
}# 1. Comprehensive whitelist for production
{
"whitelist": {
"trusted_ips": [
"127.0.0.1", "::1",
"10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16"
],
"trusted_processes": [
"systemd", "kernel", "kthreadd", "ksoftirqd",
"sshd", "networkd", "resolved", "chronyd",
"nginx", "apache2", "mysql", "postgres"
],
"excluded_dirs": [
"/proc", "/sys", "/dev", "/run", "/tmp",
"/var/cache", "/var/lock", "/usr/share/doc"
]
}
}
# 2. Minimal whitelist for security
{
"whitelist": {
"trusted_ips": ["127.0.0.1", "::1"],
"trusted_processes": ["systemd", "sshd"],
"excluded_dirs": ["/proc", "/sys", "/dev"]
}
}# 1. Configure log rotation
# Add to ~/.nord_security/config.json
{
"logging": {
"max_log_size_mb": 50,
"max_log_files": 7,
"compress_old_logs": true,
"cleanup_days": 30
}
}
# 2. Automated cleanup script
#!/bin/bash
# nord_log_cleanup.sh
LOG_DIR="$HOME/.nord_security/logs"
# Compress logs older than 1 day
find "$LOG_DIR" -name "*.log" -mtime +1 -exec gzip {} \;
# Remove logs older than 30 days
find "$LOG_DIR" -name "*.log.gz" -mtime +30 -delete
find "$LOG_DIR" -name "*.json" -mtime +30 -delete
# Remove empty log files
find "$LOG_DIR" -name "*.log" -empty -delete
echo "Log cleanup completed"# 1. Filter out informational events
{
"alerts": {
"log_level": "WARNING", // Only log WARNING and above
"store_info_events": false
}
}
# 2. Event deduplication
{
"events": {
"deduplicate_similar": true,
"deduplication_window": 300, // 5 minutes
"max_events_per_type": 100
}
}# 1. Minimal configuration for <2GB RAM
{
"monitoring": {
"network_monitoring": true,
"process_monitoring": false,
"file_integrity": false,
"port_monitoring": false,
"log_monitoring": false,
"check_interval": 10
},
"thresholds": {
"cpu_usage": 95,
"memory_usage": 95,
"disk_usage": 90
},
"performance": {
"max_memory_mb": 128,
"thread_pool_size": 2
}
}
# 2. Batch processing for slow systems
{
"batch_processing": {
"enabled": true,
"batch_size": 10,
"batch_interval": 30
}
}# 1. Full monitoring for powerful systems
{
"monitoring": {
"network_monitoring": true,
"process_monitoring": true,
"file_integrity": true,
"port_monitoring": true,
"log_monitoring": true,
"check_interval": 1,
"deep_scan": true
},
"performance": {
"max_memory_mb": 1024,
"thread_pool_size": 8,
"parallel_processing": true
},
"advanced_features": {
"machine_learning_detection": true,
"behavioral_analysis": true,
"anomaly_detection": true
}
}# 1. Cron jobs for automated tasks
# Edit crontab with: crontab -e
# Daily vulnerability scan at 2 AM
0 2 * * * /home/user/.local/bin/nord scan --no-banner
# Weekly report generation on Sunday at 3 AM
0 3 * * 0 /home/user/.local/bin/nord report --no-banner
# Log cleanup every day at 4 AM
0 4 * * * /home/user/nord/nord_log_cleanup.sh
# Health check every 6 hours
0 */6 * * * /home/user/nord/nord_health_check.sh >> ~/.nord_health.log#!/bin/bash
# nord_performance_scheduler.sh
# Monitor system load and adjust NORD behavior
LOAD_1MIN=$(uptime | awk -F'load average:' '{print $2}' | awk '{print $1}' | sed 's/,//')
if (( $(echo "$LOAD_1MIN > 2.0" | bc -l) )); then
echo "High load detected, reducing NORD monitoring intensity"
# Create low-intensity config
cat > ~/.nord_security/config_low.json << EOF
{
"monitoring": {
"network_monitoring": true,
"process_monitoring": false,
"file_integrity": false,
"port_monitoring": false,
"log_monitoring": false,
"check_interval": 15
}
}
EOF
# Restart with low-intensity config
pkill -f "nord.py start"
sleep 2
nord start --config ~/.nord_security/config_low.json --no-banner &
else
echo "Normal load, using standard configuration"
fiDevMonix Technologies is a leading cybersecurity solutions provider, specializing in custom software solutions, cyber security solutions and DevOps services for enterprise security:
- π Enterprise Security Solutions
- π‘οΈ Threat Detection Systems
- π Security Automation
- π Vulnerability Assessment
- π Security Analytics
- Website: www.devmonix.io
- Contact: [email protected]
This project is licensed under the MIT License - Developed and maintained by DevMonix Technologies
For issues and questions:
- Check the troubleshooting section above
- Review log files in
~/.nord_security/logs/ - Create an issue on the project repository
- Contact DevMonix support team
NORD Security System - Enterprise-grade protection for Parrot OS by DevMonix Technologies.