(Page 2 of 7)   < Prev  1 2 3 4 5 6 7  Next >

Platform: SCO

Ethereal
Added 2004-03-26
by Gerald Combs,
Ethereal is a network protocol analyzer, or "packet sniffer", that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality packet analyzer for Unix, and the most useful packet analyzer on any platform.

LSH
Added 2004-02-09
by Niels Möller, nisse@lysator.liu.se
lsh is an implementation of the SSH protocol version 2. It is under active development. Developer contributions are welcome from both inside and outside the US.

Big Brother
Added 2004-01-06
by Sean MacGuire, sean@iti.qc.ca
Big Brother is a combination of monitoring methods. Unlike SNMP where information is just collected and devices polled, Big Brother is designed in such a way that each local system broadcasts its own information to a central location. Simultaneously, Big Brother also polls all networked systems from a central location. This creates a highly efficient and redundant method for proactive network monitoring.

Inflex
Added 2003-11-17
by Paul L Daniels,
Inflex is an email scanner which encapsulates your existing sendmail server setup. It scans both incoming and outgoing email and it does not alter your current /etc/sendmail.cf file. It can scan for email viruses, unwanted file types (eg. EXE, BMP, MPEG) and file names (eg. prettypark.exe). It can also be used to scan for text snippets within emails and to insert disclaimers into outbound emails.

Webmin Usermonitor
Added 2003-10-17
by Alexander Gehrig
Webmin Usermonitor is a Webmin module that allows you to view all user connections to the system which are based on Telnet, SSH, or Samba. It is able to kill a user's connection or send a message to the user.

Steghide
Added 2003-10-15
by Stefan Hetzl
Steghide is steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. Steghide is designed to be portable and configurable and features hiding data in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data.

The GNU Privacy Guard
Added 2003-08-26
by Werner Koch
GnuPG (the GNU Privacy Guard) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Ups shutdown script
Added 2003-08-22
by Ben Kelly
Ups shutdown script is a set of bash scripts that can be used to monitor a SNMP UPS and shut down servers if the power goes out. One of the scripts can run on a monitoring server and will report back when a UPS has gone offline.

Monitoring Application for Resources and Servers
Added 2003-06-16
by Brian H. Trammell Ben Parrot
MARS is a host based system monitoring tool. It contains a distributed agent, SPOT, which is placed on each host. The MARS server can then obtain information about each of the machines the agent is running on, including status, load information, disk activity and memory information. MARS is Java based, and should run on any Unix supporting Java, as well as Microsoft Windows products.

Sysmon
Added 2003-05-20
by Jared Mauch, jared@puck.nether.net
Sysmon is a network monitoring tool designed to provide high performance and accurate network monitoring. Currently supported tests include monitoring of SMTP, IMAP, HTTP, TCP, UDP, Radius, NNTP, and POP3 servers. It also includes the ability to ping hosts and routers. Sysmon has the ability to understand real network topologies, including the ability to monitor multiple paths and only report the actual device that is down instead of a router that is down, and all the hosts behind it.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus