(Page 3 of 5)   < Prev  1 2 3 4 5  Next >

Platform: DG-UX

LibNet
Added 2001-10-22
by route
Libnet is an API to help with the construction and handling of network packets. It provides a portable framework for low-level network packet writing and handling (use libnet in conjunction with libpcap and you can write some really cool stuff). Libnet includes packet creation at the IP layer and at the link layer as well as a host of supplementary and complementary functionality. Still in it's infancy however, the library is evolving quite a bit. It is mainly useful for quick and simple packet assembly and related applications (Traceroute and ping were easily rewritten using libnet). See the manpage and sample test code for more detailed information.

TCP Wrappers
Added 2001-10-22
by Wietse Venema
The tcp_wrapper package by Wietse Venema. Formerly called log_tcp. Allows monitoring and control over who connects to a hosts TFTP, EXEC, FTP, RSH, TELNET, RLOGIN, FINGER, and SYSTAT ports. Also includes a library so that other programs can be controlled and monitored in the same fashion.

Libpcap
Added 2001-10-22
by Van Jacobson,Craig Leres and Steven McCanne, all of the Lawrence Berkeley National Laboratory
This is a handy little library which provides a packet filtering mechanism based on the BSD packet filter (BPF). Most notably, tcpdump needs this to work, and there is also a perl module (still in beta) which can use this as well. In plain english, if you want to write your own network traffic analyzer, this is the place to start.

CFS
Added 2001-10-22
by Matt Blaze
The cryptographic file system (also known as CFS) is a way of storing encrypted files and entire directories. It runs as a local nfs server.

Code Breakers Workbench
Added 2001-10-22
by Robert W. Baldwin
The Code Breaker's Workbench - break crypt(1) encrypted files.

Traceroute
Added 2001-10-22
by Van Jacobson
Traceroute is a system administrators utility to trace the route ip packets from the current system take in getting to some destination system. See the comments at the front of the program for a description of its use. This program a) can only be run by root (it uses raw ip sockets). b) REQUIRES A KERNEL MOD to the raw ip output code to run.

dig
Added 2001-10-22
by Steve Hotz
Dig (domain information groper) is a flexible command line tool which can be used to gather information from the Domain Name System servers. Dig has two modes: simple interactive mode which makes a single query, and batch which executes a query for each in a list of several query lines. All query options are accessible from the command line.

Xip
Added 2001-10-22
by Martin Gall
Xip is a graphical protocol analyzer.

Domain Walking Tool
Added 2001-10-22
by Unkown
This simple utility is an sh(1) shell script which allows you to walk first level domains and down.

TCFS
Added 2001-10-22
by TCFS Group - University of Salerno
TCFS is a Transparent Cryptographic File System that is a suitable solution to the problem of privacy for distributed file system. By a deeper integration between the encryption service and the file system, it results in a complete trasparency of use to the user applications. Files are stored in encrypted form and are decrypted before they are read. The encryption/decryption process takes place on the client machine and thus the encryption/decryption key never travels on the network.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus