(Page 2 of 50)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Platform: Solaris

syslog-ng Premium Edition
Added 2007-08-10
by BalaBit IT Security
The syslog-ng Premium Edition application is a system logging client and server application that offers native TCP and TLS support, disk buffering, and logging directly into SQL databases. It runs on a variety of UNIX-like systems, and can also collect logs from Microsoft Windows platforms.

The Encryption Wizard for Oracle
Added 2007-06-26
by RDC, Inc.
The Encryption Wizard for Oracle is a database encryption tool designed exclusively for the Oracle RDBMS. The Encryption Wizard allows you to physically encrypt the data that resides within your database through an easy-to-use Java interface. Download a free full-featured of the Encryption Wizard for Oracle today! Along with database encryption features, the Encryption Wizard ships with advanced security and auditing functions built on the foundation of dependable encryption techniques - an intuitive interface to Oracle's own certified and tested DBMS_Crypto and DBMS_Obfuscation_Tookit packages.

SnortNotify
Added 2007-03-24
by Adam Ely
Running from cron at a specified interval SnortNotify will search a snort database for new alerts. If new alerts match a pre configured priority level, an email will be sent to the contact. The email will include Sensor name, the signaturename, and the timestamp.

Source Security
Added 2007-01-15
by
sourcesec.com provides Web-based access to code auditing applications, and was created to assist developers and users in auditing their programs for vulnerabilities. You can upload your code for static analysis by RATS, Flawfinder and ITS4 as applicable - the C/C++, PHP Python and Perl languages are supported. Additionally, a simplified search function is available which easily allows efficient Web searches for security-related information.

Pandora FMS
Added 2006-12-11
by Pandora Team
Pandora is a monitoring application to watch systems and applications, that allows to know the status of any element of your systems, watch for your hardware, your software, your multilayer system and of course your Operating System. Pandora could detect a network interface down, a defacement in your website, a memory leak in one of your server, or the movement of any value of the NASDAQ new technology market. Pandora could sent a SMS message when your systems fails... or when Google value low below US$ 330.

SafePasswd
Added 2006-10-15
by Robert Accettura
Generate safe, secure and memorable passwords quickly and easily. If a password isn't memorable it isn't used. Also visually displays how effective a password is.

ASDIC
Added 2006-10-13
by Mikael Kuisma
ASDIC is a system for advanced traffic and log analysis. It helps you to determine what traffic there is in your network. You can look at ASDIC as a reverse firewall. Input unstructured traffic information and output a rule set. ASDIC can analyze logs from any firewall or router, or sniff the network by itself.

LM-X License manager
Added 2006-06-21
by X-Formation
License manager enabling ISVs to control and safely distribute their software. Lots of features and wide platform support.

Medusa
Added 2006-06-14
by Foofus Networks
Medusa is a speedy, massively parallel, modular, login brute-forcer for network services created by the geeks at Foofus.net. It currently has modules for the following services: CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NCP (NetWare), PcAnywhere, POP3, PostgreSQL, rexec, rlogin, rsh, SMB, SMTP (VRFY), SNMP, SSHv2, SVN, Telnet, VmAuthd, VNC, and a generic wrapper module.

P-Synch
Added 2006-05-31
by M-Tech
P-Synch® is enterprise password management software. It reduces the frequency of help desk calls, improves user productivity and strengthens security with password synchronization, self-service password reset, help desk password reset and simplified administration of other authentication factors, such as hardware tokens and biometric samples. P-Synch supports over 70 types of systems.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus