(Page 2 of 6)   < Prev  1 2 3 4 5 6  Next >

Category: Replacement

logdaemon 5.7
Added 2001-10-22
by Wietse Venema, wietse@porcupine.org
This package currently supports access to the Internet through the use of a firewall system. All internal systems are hidden behind a firewall (or gateway) from the Internet. These utilities allow users from inside the network to get to archives and services on the Internet without requiring that they have an account on the gateway system.

logit 1.6
Added 2001-10-22
by Sebastian Krahmer, krahmer@cs.uni-potsdam.de
Logit is a system logger wich should replace the old syslogd program. Nobody else than privileged user and/or members of group log are allowed to write to the system logs. This provides you a 'trusted' system-logfile.

rlinetd 0.5.1
Added 2001-10-22
by Mikolaj J. Habryn, dichro-rlinetd@rcpt.to
rlinetd is intended to be a inetd replacement. It supports various features such as resource limits, renicing, interface binding, chrooting, capability support, per-service instance counts, direct tcp_wrappers interfacing, native IPv6 support and the Linux Socket Filter. Requires tcp_wrappers.

SRS (Secure Remote Streaming)
Added 2001-10-22
by Matt Conover and Mark Zielinski
SRS is a program that streams a copy of a client's logs as specified by the syslog.conf file to a trusted server on a remote site. It provides strong authentication and secure communications between the client and the server through an SSL tunnel. It is intended as a replacement for syslogd. This and syslogd may NOT be running at the same time. Features include: - Secure logging. All communications are automatically and transparently encrypted. SSL (Secure Socket Layer) v3.0 is used for the authentication and encryption. A conventional cipher (3DES, RC4, etc.) for encrypting the session. Encryption is started before SRS authentication, and no data is streamed or transmitted in the clear - No special configuration of syslogd is needed - Never trusts the network. Minimal trust on the remote side of the connection. Minimal trust on domain name servers. Pure SSL authentication never trusts anything but the private key. - The client SSL authenticates the server machine in the beginning of every connection to prevent trojan horses (by routing or DNS spoofing) and man-in-the-middle attacks, and the server SSL authenticates the client machine before accepting any commands or requests from the client. On top of this, SRS will send its own challenge cookie - Client and server keys are generated by RepSec, Inc. Each client and server is provided a unique key

Open JCE
Added 2001-10-22
by Australian Business Access, feedback-jce@aba.net.au
The Open JCE Project for JavaTM is a clean room implementation of the JavaTM Cryptography Extension (JCE) API as defined by Sun MicrosystemsTM, plus a provider of underlying crypto algorithms. This JCE is based on the early access beta2 version of the JCE as available from the Java Developer ConnectionTM early access area. Since the Sun JCE is written for JDK 1.2, there are three versions of the library included. One which is compatible with JDK 1.02, one with JDK 1.1 and one with JDK 1.2 (tested against JDK 1.2fcs). The complete source for each library is also included.

ftpd-BSD
Added 2001-10-22
by David Madore, david.madore@ens.fr
ftpd-BSD is a Linux port of OpenBSD's ftp server (note that there are other such ports). It is thought to be more secure than wu-ftpd and proftpd. This port adds PAM support, and support for on-the-fly decompression of gzipped files.

ELogList
Added 2001-10-22
by Mark Russinovich, mark@sysinternals.com
Windows NT: The Resource Kit comes with a utility, elogdump, that lets you dump the contents of an Event Log on the local or a remote computer. ELogList is a clone of elogdump except that ELogList lets you login to remote systems in situations where your current set of security credentials would not permit access to the Event Log.

StegFS Kernel Patch
Added 2001-10-22
by Andrew McDonald, andrew@mcdonald.org.uk
StegFS is a Steganographic File System for Linux. Not only does it encrypt data, it also hides it such that it cannot be proved to be there. Note that this is still 'under development'. It is not bug-free yet. There may be possibly serious problems. In short, if it destroys your computer or your data or causes a minor nuclear holocaust don't blame the programmers. Feel free to try it, but don't get too upset if you have problems. There are still bugs/misfeatures that want fixing. However, it should be stable enough for use. You will need to know how to patch and compile a kernel. It is strongly recommended that you read "StegFS: A Steganographic File System for Linux" before attempting to use this file system. StegFS is distributed as a kernel patch and a tarball containing a set of utilities. You need both to be able to use StegFS. This package is the kernel patch

StegFS tools
Added 2001-10-22
by Andrew McDonald, andrew@mcdonald.org.uk
StegFS is a Steganographic File System for Linux. Not only does it encrypt data, it also hides it such that it cannot be proved to be there. Note that this is still 'under development'. It is not bug-free yet. There may be possibly serious problems. In short, if it destroys your computer or your data or causes a minor nuclear holocaust don't blame the programmers. Feel free to try it, but don't get too upset if you have problems. There are still bugs/misfeatures that want fixing. However, it should be stable enough for use. You will need to know how to patch and compile a kernel. It is strongly recommended that you read "StegFS: A Steganographic File System for Linux" before attempting to use this file system. StegFS is distributed as a kernel patch and a tarball containing a set of utilities. You need both to be able to use StegFS. This package contains the utilities.

ffingerd
Added 2001-10-22
by Felix von Leitner, felix@fefe.de
ffingerd is a simple finger daemon written with security in mind. Features include: - Does not need to be run as root - Does not support indirect queries - Does not allow global queries ("finger @bighost") - Users can disallow finger queries by creating the file ~/.nofinger - Does not view sensitive information like the home directory or the shell. - Displays .plan, .project and .pubkey (for PGP/GnuPG/PEM public keys)

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus