(Page 2 of 5)   < Prev  1 2 3 4 5  Next >

Category: Access Control » Applications

SafeSystem
Added 2005-02-09
by GemiScorp Software Solutions
SafeSystem is a security program that allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. SafeSystem can make your files and folders completely invisible, inaccessible or simply read-only. Furthermore, SafeSystem can prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC will be healthy

Free CPM Cellular Passwords Manager
Added 2004-07-05
by
Enter our downloads page to find the free Cellular Passwords Manager.A J2ME program that will manage all your sites/accounts passwords and IDs.The program is PIN protected, simple Menu driven. This program is part of the CAT Cellular Authentication token. The CAT manages the OTPs and Fixed IDs/Passwords accounts.

Mod_security
Added 2003-12-23
by Ivan Ristic
ModSecurity is an open source intrusion detection and prevention engine for web applications. It operates embedded into the web server, acting as a powerful umbrella - shielding applications from attacks. ModSecurity supports Apache (both branches) today, with support for Java-based servers coming soon.

Hsftp
Added 2003-12-09
by Rainer Wichmann
hsftp is an ftp emulator that provides the look-and-feel of an ftp session, but uses ssh to transport commands and data. hsftp executes UNIX commands on the remote host, and thus will fail on non-Unix remote hosts. If hsftp is not set SUID root, and you have supplied a password/passphrase, it might get paged out to your swap partition during prolonged inactivity. For security, hsftp can be compiled to drop SUID root privileges irrevocably on startup, immediately after locking the memory for the password. For RSA authentication, you can avoid to have hsftp caching the passphrase if you use ssh-agent. In this case, you can use hsftp securely without setting it SUID root. hsftp has been developed on Linux. It is known to compile on a variety of other UNIX flavours (at least FreeBSD, Solaris, AIX, and HP-UX), but may not work on all. Fixes for portability are welcome for inclusion.

JWall
Added 2003-08-07
by Zack Link
JWall is a Java-based application for graphically building and installing rules for one or more firewalls, local or remote.

Firepass
Added 2003-06-03
by Alex
Firepass is a tunneling tool, allowing to bypass firewall restrictions and encapsulate data flows inside legal ones to use HTTP POST requests. TCP or UDP based protocols may be tunneled with Firepass. For now, both - client and server parts are written in Perl. C versions will be published soon. The Firepass key feature is that you may use several type of installation of the server part script in the external network. You do not need to bind any port on the external box. Everything looks clear from local and external boxes administrators point of view. There is only an usual HTTP dialog between client and server. The only problem is that HTTP messages are sends too often.. But this is configurable in the Firepass client with a special delay option between HTTP requests. It may be applied to some non time critical protocols. Firepass may also be usable for the reverse task, when the server script is located at the corporative web server and when client interact with it from the external network.

Access Control Designer
Added 2003-05-30
by Robert Trebula R0B0
Access Control Designer is a universal modular tool for visually designing access control policies. The user of this system depicts requirements for the designed security policy in a graphical notation based on a generally accepted security model. The tool will then generate a configuration of security mechanisms, which will be used for the implementation of the security policy. Modularity of the tool will allow users to design security policies for a lot of various environments - systems needed to have access controlled. A pluggable module API allows third-party programmers to provide ACD modules for systems and so allow users to use ACD for designing access control policies for the systems.

ProBot SE
Added 2002-05-14
by NetHunter Group
ProBot SE is a workstation monitoring and keylogging suite. This software generates the detailed event log that is kept securely in binary files. These files may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE remains undetected even under the most prying eyes. It is invisible both in Windows 9x/ME Ctrl+Alt+Del List and Windows NT process list.

CHX-I Universal Application Firewall and Intrusion Detection Engine.
Added 2001-12-06
by IDRCI Inc.
CHX-I is a TCP Application firewall. New in version 1.7: - SSL taffic analysis engine allows for in-transit TCP payload firewalling - SSL server side transparent encryption allows encryption of TCP application services - In-transit TCP packet data modification allows for manipulation of sensitive or undesired data - Asynchronous reverse data flow search allows for traffic direction specifications - Multiple engine actions on traffic flow such as Drop, Log and Replace

Gnome Xsu
Added 2001-11-29
by Philip Van Hoof
Gnome Xsu is an interface for the command "su - username -c command". It is not setuid root, and it uses the standard Unix "su" to run commands.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus