(Page 11 of 21)   < Prev  6 7 8 9 10 11 12 13 14 15 16  Next >

Category: Authentication

Password Policy Enforcer
Added 2002-08-26
by ANIXIS
Password Policy Enforcer allows network administrators to create and enforce a password policy. A password policy ensures that users are choosing strong (difficult to crack) passwords. PPE checks every new password for compliance with the policy. Passwords that do not comply with the policy are rejected. PPE also displays password policy messages that help users to choose compliant passwords without having to call the helpdesk for assistance.

Centron
Added 2002-08-06
by Peter Robinson
The Centron Gateway is an "out-of-band" strong authentication and connection gateway system. Centron is an access concentrator which performs strong authentication of user requests. In a security conscious environment, it allows an organization to effectively provide wide-ranging access to systems or services through a single, secure access point.

GNU Privacy Guard DNS Keyserver Client
Added 2002-07-08
by Simon Josefsson
GNU Privacy Guard DNS Keyserver Client enables sending and retrieving OpenPGP keys with GnuPG to and from DNS-based keyservers. DNS-based keyservers offer several advantages over traditional HTTP-based ones, such as distributed caching, server fail-over, and geographical optimal server selection, etc.

ssh-multiadd
Added 2002-06-26
by Matthew Mueller
ssh-multiadd adds multiple ssh keys to the ssh authentication agent. These may use the same passphrase. When run without arguments, it adds $HOME/.ssh/identity and $HOME/.ssh/id_dsa. Alternative file names can be given on the command line or in the configuration file. It uses ssh-askpass if necessary. Unlike ssh-add, if any of the keys use the same passphrase, you will only need to enter each unique passphrase once, and keys that are already added will not be prompted for again.

PassGuard Framework
Added 2002-06-12
by RUAUDEL Frédéric
PassGuard Framework is a library for the PassGuard suite of programs that is used to manage numerous passwords in an encrypted file. Encryption is managed with a plugin system, which allows easy support for any kind of encrypted file.

TPassguard
Added 2002-06-12
by RUAUDEL Frédéric
TPassguard is designed for working with Unix systems or the Web, where you need to remember a number of passwords. This program manages passwords in an encrypted file, so that you only have to remember one. It uses the PassGuard Framework and can be interfaced with any kind of encryption via a plugin system.

Advanced WordPerfect Office Password Recovery
Added 2002-06-06
by ElcomSoft Co. Ltd.
Advanced WordPerfect Office Password Recovery (or simply AWOPR) is a program to recover lost or forgotten passwords to Corel WordPerfect Office documents: WordPerfect (*.wp, *.wpd), QuattroPro (*.qpw, *.wb?, *.wq1), Paradox (*.db). All versions of WordPerfect Office and its components (up to 2002) and protection modes are supported; the passwords are being recovered instantly or in a matter of minutes. Multilingual passwords are supported.

SCTK PAM module
Added 2002-06-06
by Alexandre Becoulet
The SCTK PAM module allows user authentication using PIC-based smart cards. It is based on the Smart Card ToolKit. The PAM module and the PIC code implement a simple challenge algorithm to securely authenticate users.

The GNU Privacy Guard
Added 2002-05-07
by Tushar
GnuPG (the GNU Privacy Guard) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

ifmonitor
Added 2002-05-06
by Edson Medina
ifmonitor is a network interface traffic logger and grapher for Linux. It does not depend on SNMP, and it is written in Perl/PHP. It uses MySQL to store its logs.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus