(Page 3 of 50)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Access Control

pyctd
Added 2006-11-09
by INL SARL
pyctd is a XML-RPC service for monitoring and altering Netfilter connections for network admins. It has the following functionnalities : * Connections listing (with byte rate of connections) * Entries removal * Modification of mark and timeout pyctd is a free software released under GNU General Public License. By using XML-RPC, frontends can be easily built. A PHP frontend is already available.

RiskProfile Tool
Added 2006-10-31
by Perimeter Internetworking
A uniquely powerful self-assessment and security planning tool for financial services institutions by Perimeter Internetworking, the only provider of complete e-security on demand. In a twenty-minute online session, the powerful RiskProfileTM system helps IT and technology executives align security plans and spending with the business risks of their institutions, and provides valuable data benchmarking the user’s results against other institutions.

ASDIC
Added 2006-10-13
by Mikael Kuisma
ASDIC is a system for advanced traffic and log analysis. It helps you to determine what traffic there is in your network. You can look at ASDIC as a reverse firewall. Input unstructured traffic information and output a rule set. ASDIC can analyze logs from any firewall or router, or sniff the network by itself.

ServerAngel
Added 2006-10-12
by
A port and vulnerability scanner. Audit what the internet can actually see running on your server. Use your report to harden your services against attack.

UserLock
Added 2006-09-29
by IS Decisions
UserLock secures access to Windows networks by controlling the amount of simultaneous sessions and by limiting network access per user or group. With UserLock, a network administrator can implement and enforce efficient restriction and access policies for Windows NT/2000/XP/2003 networks (LAN and WAN), and monitor and manage all sessions in real time: receive alerts, remotely disconnect or lock a user session and automatically log activity and generate precise session reports and statistics.

SecurWall
Added 2006-09-18
by SecurStar
SecurWall is a personal desktop firewall designed to protect computers against malicious attacks, port scanning, viruses and other malicious software entities, making your PC invisible on the Internet and making your IP anonimous when surfing.

JAAScois PC Monitor v1.0
Added 2006-09-10
by JAAScois
» Protecting system and windows startup » Protecting internet explorer from hijacks & spyware » Preventing access to computer settings » Internet filtering for web sites , chat rooms and e-mail

MDCrack
Added 2006-09-07
by Gregory Duchemin
MDCrack is a free featureful password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multi threading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s). This yields to phenomenal performance even on old generation multi-CPUs systems. Several options offer fine tuning for the attack and allow to save and resume your session at a later time. This program has multiple uses in real life, while its primary goal is obviously to test the strength of hashed passwords, it can also be used as a raw benchmark tool for integer calculs. For any question you may have, please be sure to first read the Frequenty Ask Questions file (FAQ) provided in MDCrack ZIP file. I hope you will enjoy this program.

Spamtitan ISO
Added 2006-08-17
by Ronan Kavanagh
SpamTitan ISO provides the comprehensive solution to email threats on the market today. Our software allows you to create an email appliance, protecting from Viruses, Spam and Phishing. The solution uses best of breed technologies to provide an easily installed, easily managed and highly secure solution for your email. Dual Anti Virus including Kaspersky Labs 98%+ Spam Detection Content Filtering In and outward bound email scanning Disclaimers Load Balancing Options End User Spam Management Plug and Play Set up Web GUI Fully automated Updating Full reporting suite LDAP Integration 30 Day Free Trial Available. Contact info@spamtitan.com for an evaluation licence

SpamTitan for VMware
Added 2006-08-17
by Ronan Kavanagh
SpamTitan for VMware provides the comprehensive solution to email threats on the market today. Our software allows you to create a virtual email appliance, protecting from Viruses, Spam and Phishing. The solution uses best of breed technologies to provide an easily installed, easily managed and highly secure solution for your email. Dual Anti Virus including Kaspersky Labs 98%+ Spam Detection Content Filtering In and outward bound email scanning Disclaimers Load Balancing Options End User Spam Management Plug and Play Set up Web GUI Fully automated Updating Full reporting suite LDAP Integration 30 Day Free Trial Available. Contact info@spamtitan.com for an evaluation licence

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus