(Page 3 of 7)   < Prev  1 2 3 4 5 6 7  Next >

Category: Access Control » user privileges

eXtended Allow - Deny list for PAM
Added 2003-03-12
by Adrian Ber
XAD is a very easy to configure PAM module. Through a very easy language you can allow/deny access to users.

NTFS Reader for DOS
Added 2002-08-26
by Active@ Data Recovery Software
NTFS Reader for DOS is a freeware tool that provides read access to NTFS partitions within the MS-DOS environment. You can preview files on NTFS and copy files from NTFS to FAT volumes or network drives. Can be run from DOS bootable floppy.

Simp (Secway's Instant Messenger Privacy)
Added 2002-07-17
by Secway
Simp (Secway's Instant Messenger Privacy) is a tool developed by Secway to secure your online MSN Messenger conversations. Simp works by encrypting messages before they are sent over the Internet and decrypting them when they arrive at your contacts. Once installed on your and your friends computer, Simp will prevent anyone from reading your conversations.

DumpUsers
Added 2002-07-02
by Arne Vidstrom
DumpUsers is able to dump account names and information even though RestrictAnonymous has been set to 1. More information can be found in the DumpUsers FAQ.

Exec Denier
Added 2002-05-15
by Mihai Chelaru
Exec Denier is a NetBSD kernel module that restricts exec syscalls for certain UIDs. It is very useful for blocking exec calls for named and ntpd. It can also restrict exec calls for users to a certain directory.

mmftpd
Added 2002-04-25
by Matthew Mondor
mmftpd is a secure FTP server that runs as a normal user, and supports virtual users only. Each user may have specific permissions, and the daemon uses libpth for portable threads instead of fork(). It runs on both BSD and Linux systems, and is ideal for a setup with many Web virtual host customers. It was written from scratch, with no borrowed code.

DeviceLock
Added 2002-03-27
by SmartLine, Inc., devicelock@protect-me.com
DeviceLock gives network administrators control over which users can access what devices (ports, floppies, Magneto-Optical disks, etc.) on a local computer. Once DeviceLock is installed, administrators can assign permissions to LPT ports, CD-ROMs, COM ports or any other device, just as they would to share-permissions on a hard disk. Network administrators can use DeviceLock to flush a storage device's buffers (very useful for removable media) and to get extended information about devices and NTFS partitions. Remote control is also available.

NorthStar
Added 2002-03-07
by Hitesh Patel AKA BrownKid
NorthStar is a system to track IP allocations and assign them to specific devices, owners, and locations. NorthStar can nest allocations as deep as you like and also has a user permissions system to control additions, modifications, and deletions of data.

NetBIOS Enumeration Utility
Added 2002-03-04
by NTSleuth
Features Include: - Enumeration of account lockout threshold - Enumeration of local groups and user accounts - Enumeration of global groups and user accounts - Enumeration of shares - RestrictAnonymous bypass routine And also Password Checking: - Checks for user accounts with blank passwords - Checks for user accounts with passwords that are the same as the username in lower case

GNet Anonymous Distributed File Sharing System
Added 2002-02-04
by Christian Grothoff
GNet is a decentralized, distributed network with confidential and authenticated communication. A first service implemented on top of the networking layer allows anonymous distribution and retrieval of content.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus