(Page 12 of 27)   < Prev  7 8 9 10 11 12 13 14 15 16 17  Next >

Category: Access Control » Firewall

PortSentry
Added 2002-04-10
by Craig Rowland
PortSentry is part of the TriSentry suite of security tools. It is a program designed to detect and respond to port scans against a target host in real-time. Stealth detection modes are available under all Unix platforms and detects SYN, FIN, NULL, XMAS, and Oddball packet scans. All modes support real-time blocking and reporting of violations.

cp2fwbuilder
Added 2002-04-08
by Stefan Majer
cp2fwbuilder (Checkpoint Firewall 1 to FwBuilder) helps you to migrate an existing Checkpoint Firewall 1 installation and its rulesets to Linux with iptables or a BSD-based firewall. This is done by converting the Rulebase- and the Objects-database from Checkpoint to the FirewallBuilder XML Format.

Turtle Firewall
Added 2002-04-03
by Frigido
A firewall configuration project based on Linux 2.4.x and iptables. It has a web interface with an intuitive Webmin module.

DeleGate
Added 2002-03-27
by Yutaka Sato, ysato@etl.go.jp
DeleGate is a multi-purpose application level gateway, or a proxy server which runs on multiple platforms (Unix, Windows and OS/2). DeleGate mediates communication of various protocols (HTTP, FTP, NNTP, POP, Telnet, etc.), applying cache and conversion for mediated data, controlling access from clients and routing toward servers. It translates protocols between clients and servers, merging several servers into a single server view with aliasing and filtering. Born as a tiny proxy for Gopher in March 1994, it has steadily grown into a general purpose proxy server. Besides proxy, DeleGate can be used as a simple origin server for some protocols (HTTP, FTP and NNTP).

DAXFi
Added 2002-03-27
by Davide Alberani
DAXFi is a Python script that helps configure several different kinds of firewalls in a consistent way. It can run as daemon to adapt its behavior to external conditions; rules can be described with XML files, XML strings, or generated directly by the code; the program can be configured and extended with a sort of plug-ins written in Python. It comes with a Python package, useful to build other applications aimed to manipulate different firewalls in a uniform way (some example programs are included).

GIPTables Firewall
Added 2002-03-26
by Adrian Pascalau
GIPTables Firewall is a set of shell scripts that helps you generate iptables rules for Linux 2.4.x and newer kernels. It is very easy to configure and designed to run on hosts with one or two network cards. It uses NAT, stateful packet filtering, rate-limited connection, and logging. It provides protection against DoS attacks and IP spoofing, as well as TCP packet health checks.

mod_protection
Added 2002-03-21
by Pierpaolo Giacomin
mod_protection is an Apache module that integrates the basic function of an IDS (Intrusion Detection System) and a firewall. When a malicious client sends a request that matches a rule, the administrator will be warned and the client gets an error message.

tsocks
Added 2002-03-18
by Shaun Clowes,
SOCKS V4 proxy (usually on a firewall). tsocks intercepts the calls applications make to create TCP connections and determines if they can be directly accessed or need the SOCKS server. If they need the SOCKS server they connection is negotiated with the server transparently to the application. This allows existing applications to use SOCKS without recompilation or modification. tsocks is a wrapper library for the libc connect() call. Changes: Fixes to compile on Solaris 2.6, 2.7, and 2.8, and fixes for makefile problems. Fixes were made for bugs with setting socket options, and for problems with unresolved symbols. Support was added for forcing all applications to use TCP DNS so it can be transparently proxied.

Advanced Administrative Tools
Added 2002-03-14
by G-Lock Software
AATools for Windows is a great set of utilities for analyzing network properties. It will test pretty much every network operation you could want to know about. AATools will check Email properties, Scan ports and proxies, give network and system statuses, clean up unnecessary registry entries in your registry, etc. The information it conveys is easy to digest and setting up a test is likewise very simple. A worthwhile download for anyone wanting to gather info on their network or PC. AATools should be a part of your security toolkit and you should employ them regularly.

theWall
Added 2002-03-13
by FreeBSDFan
theWall is a single floppy firewall and NAT box based on PicoBSD/FreeBSD. The primary aim is to allow a small network to share a cable modem or DSL Internet connection. It currently supports static or DHCP IP address assignment.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus