(Page 2 of 10)   < Prev  1 2 3 4 5 6 7  Next >

Category: System Security Management » Linux

cenfw
Added 2006-05-17
by Peter Robinson
The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules. Now with NAT capabilities and secure SSH access to firewall.

cenfw
Added 2006-05-02
by Peter Robinson
The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules. Now with Snat, Dnat and Masq Functionality. Many other bug fixes.

darc - Distributed Aide Runtime Controller
Added 2006-04-24
by Jacob Martinson
darc is a multi-threaded Python application designed for managing AIDE installations in large heterogeneous networks. It provides centralized database management, unified reporting, and eliminates the need to maintain Aide databases and binaries on read-only media.

FireMon
Added 2006-03-27
by Secure Passage
FireMon, is an Enterprise Security Management application that provides visibility to and control of network changes, configurations, and performance. Designed as a security tool, FireMon monitors configurations, evaluates configuration effectiveness, and alerts administrators to changes in configurations. FireMon controls devices by implementing intelligent device information processing and combining it with input from technical experts and customer requirements. FireMon meets key needs of security professionals, particularly security managers, auditors, security administrators, and network professionals with security concerns.

SysChk
Added 2006-01-21
by h0e
SysChk is a tool to aide in the monitor of file system integrity. This tool will ensure the integrity of files & directories is monitored for any changes. Monitored changes include: User Ownership. Group Ownership. File Permissions. Modified Time. Md5 Hash.

PBNJ
Added 2006-01-18
by Joshua D. Abraham
PBNJ is a network tool that can be used to give an overview of a machine or multiple machines which includes the details about the services running on them. PBNJ is different from other tools because it is based on using a scan from nmap parsed to amap. PBNJ parses the data from a scan and outputs to a CSV format file for each ip address scanned.

Coarse PortKnocking
Added 2005-11-03
by Andre Luiz Rodrigues Ferreira
This is a simple implementation of Port Knocking techniques. This sniffs network packets with determined keys and executes commands like firewall to open and close ports. In the client mode injects packets with key to server.

SecureCentral PatchQuest
Added 2005-09-30
by AdventNet Inc.
PatchQuest is a patch management software to distribute and manage security patches and hotfixes & service packs for Windows and Linux systems. It operates in both agent-based and agentless modes.

Travesty
Added 2005-03-07
by Robert Wesley McGrew
Travesty is an interactive program for managing the hardware addresses (MAC) of ethernet devices on your computer. It supports manually changing the MAC, generating random addresses, and applying different vendor prefixes to the current address. It also allows the user to import their own lists of hardware addresses and descriptions that can be navigated from within the Travesty interface. Travesty is written in Python, and is very simple to add functionality to, or modify.

Sherpa
Added 2004-11-30
by Rick Crelia, rick@nbank.net
Sherpa is a tool for configuring and then checking system security via the console. Written in perl, it allows an admin to maintain a custom database of file and directory permissions and ownership attributes as local needs dictate. Any changes from the prescribed layout will be detected each time Sherpa is run. Also, Sherpa does some basic system checks (world-writable files, .rhosts and hosts.equiv files, etc.) that help the busy admin keep on top of a system.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus