(Page 11 of 40)   < Prev  6 7 8 9 10 11 12 13 14 15 16  Next >

Category: System Security Management

Honeynet Security Console
Added 2004-08-18
by Activeworx, Inc.
Honeynet Security Console is an analysis tool to view events on your personal honeynet. It gives you the power to view events from Snort, TCPDump, Firewall, Syslog and Sebek logs. It also allows you to correlate events from each of these data types to have a full grasp of the attackers' actions.

cenfw
Added 2004-08-16
by Peter Robinson
The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules.

DiskLogon
Added 2004-08-03
by DiskLogon Development Team
DiskLogon, like a Smart Card logon, is a software that enables you to log on to your computer with a removable disk. DiskLogon saves you the trouble of entering your user name and password every time you log on. All you have to do is to plug in your removable disk, and you can log on to your computer quickly and safely. When you plug out your removable disk, your computer will automatically lock up you're your safety.

tinysofa enterprise server
Added 2004-07-23
by Omar Kilani
tinysofa enterprise server is a secure server targeted enterprise grade operating system. It is based on Trustix Secure Linux and includes a complete distribution port to Python 2.3 and RPM 4.2, an overhauled PAM authentication system providing system-wide authentication configuration, the latest upstream packages, the replacement of ncftp with lftp, the addition of gdb and screen, feature additions to the swup updater that provide multiple configuration file support, user login FTP support, enable/disable support, variable expansion support (allows multiple architectures), and many enhancements.

e-Surveiller
Added 2004-07-22
by SurveilleTech Software
e-Surveiller is a powerful user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time. It stealthily records all keystrokes, web site visits, AOL, AIM,

SecureAware
Added 2004-07-20
by Neupart A/S
SecureAware is an information security management intranet for creating and communicating business-level security policies, procedures and awareness programs. It drastically reduces the time and effort required to perform these tasks because it does not rely on text-based templates. Awareness content is automatically generated from your specific policy rules, combined with built-in generic security lessons.

Anti-Cracker Shield
Added 2004-07-19
by SoftSphere
Protect your computer from Internet worms and hackers' attacks, which become possible due to the operational system and software vulnerabilities ("exploits"). Neither antiviruses, nor firewalls can protect from exploits. Only Anti-Cracker Shield, a multilevel security system is able to cope with all known and unknown versions of "exploits". It is possible and is necessary to protect from hackers!

MaxPatrol
Added 2004-07-15
by Positive Technologies
MaxPatrol is a professional network security scanner distinguished by its uncompromisingly high quality of scanning, optimized for effective use by companies of any size (serving from a few to tens of thousands of nodes). It supports vulnerability testing for servers with non-standard configurations, intelligent recognition of vulnerabilities in known (and custom)web-server scripts, full identification of RPC services and more.

Wasabi
Added 2004-06-21
by Andrea Barisani
Wasabi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Additionally, uninteresting fields in the log lines (such as PID numbers) can be masked with the standard regular ex

Devil-Linux
Added 2004-06-02
by Heiko Zuerker
Devil-Linux is a special Linux distribution which is used for firewalls/routers. The goal of Devil-Linux is to have a small, customizable, and secure Linux system. Configuration is saved on a floppy disk, and it has several optional packages.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus