(Page 2 of 6)   < Prev  1 2 3 4 5 6  Next >

Category: System Security Management » Filesystem

SafeSystem
Added 2005-02-09
by GemiScorp Software Solutions
SafeSystem is a security program that allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. SafeSystem can make your files and folders completely invisible, inaccessible or simply read-only. Furthermore, SafeSystem can prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC will be healthy

GNUnet
Added 2004-05-06
by Christian Grothoff
GNUnet is a peer-to-peer framework with focus on providing security. All link-to-link messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the peer-to-peer traffic in UDP, TCP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the core GNUnet framework is anonymous file sharing.

FTimes
Added 2004-05-06
by Klayton Monroe
FTimes is a system baselining and evidence collection tool. Its primary purpose is to gather and/or develop information about specified directories and files in a manner conducive to intrusion analysis. It was designed to support the following initiatives: content integrity monitoring, incident response, intrusion analysis, and computer forensics.

jailed
Added 2004-04-30
by Johan Lindh
jailed implements a nonprivileged jailroot. It allows an environment to be specified, does std(in/out/err) redirection, and can restart a failed child.

kopkop
Added 2004-04-27
by mcree
The kopkop daemon listens for encrypted, signed, and fully random-looking command packets. Only the fields essential for the packets' travel trough the Internet are filled with "sane" data. Upon reception and after a preset timeout, the daemon executes user-defined commands. This can be used to open firewalls, so you can reduce your system's attack surface by hiding certain services until you need to use them. The kopkop client creates and sends the encrypted packets, and is included. The communication is strictly unidirectional and quite minimal between the client and the server. Replay attacks are forestalled by storing and comparing monotonically increasing packet IDs on both sides.

File system investigator
Added 2004-04-26
by wrossi
File system investigator is a forensic tool for viewing filesystems. It is written entirely in Java, so it is platform independent. It allows viewing of ReiserFS and EXT2/3. While primarily intended as a forensics tool, it is also useful for Linux users who dual boot with another OS; it allows them to view and extract files from their partitions.

PHP Service Monitor
Added 2004-04-26
by Vidyut Luther
PHP Service Monitor is a basic server/service monitor where you specify what server and what services you want to monitor for each specific server. It will monitor the services, and notify you via email and GUI if the service is down.

INSERT
Added 2004-04-05
by Matthias Mikuletz
INSERT (the Inside Security Rescue Toolkit) aims to be a multi-functional, multi-purpose disaster recovery and network analysis system. It boots from a credit card-sized CD-ROM and is basically a stripped-down version of Knoppix. It features good hardware detection, fluxbox, emelfm, links-hacked, ssh, tcpdump, nmap, chntpwd, and much more. It provides full read-write support for NTFS partitions (using captive), and the ClamAV virus scanner (including the signature database).

BitDefender Remote Admin
Added 2004-03-02
by BitDefender
BitDefender Remote Admin is a webmin module to manage BitDefender for Linux Solutions (antivirus and antispam) for mail and file servers.

Just For Fun Network Management System
Added 2004-02-24
by Javier Szyszlican
Just For Fun Network Management System features an integrated syslog, Tacacs, TFTP configuration download, SNMP polling, SNMP traps, journal, autodiscovery, performance graphs (RRD), SLAs, and a lot more. Everything uses a database MySQL/PostgreSQL) backend. It works in Linux and Windows.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus