(Page 3 of 16)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Utilities » System

lock
Added 2004-11-15
by Uri Fridman
Lock is a command line tool to lock the workstation, options include: - lock the workstation - lock workstation and run default screensaver - minimize all open windows and lock the workstation - send the system to sleep (standby) open source, free and small.

Rootkit Hunter
Added 2004-08-19
by M. Boelen
Rootkit scanner is scanning tool to ensure you for about 99.9% you're clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like: - MD5 hash compare - Look for default files used by rootkits - Wrong file permissions for binaries - Look for suspected strings in LKM and KLD modules - Look for hidden files - Optional scan within plaintext and binary files Rootkit Hunter is released as GPL licensed project and free for everyone to use.

DNSSEC Walker
Added 2004-06-02
by Simon Josefsson
DNSSEC Walker is a tool to recover DNS zonefiles using the DNS protocol. The server does not have to support zonetransfer, but the zone must contain DNSSEC "NXT" records.

RFC
Added 2004-05-10
by Claudio "sekko" Panichi
RFC (Remote Filesystem Checker) is a set of scripts that aims to help system administrators run a filesystem checker (like tripwire, aide, etc.) from a "master-node" to several "slave-nodes" using ssh, scp, sudo, and few other common shell commands.

FTimes
Added 2004-05-06
by Klayton Monroe
FTimes is a system baselining and evidence collection tool. Its primary purpose is to gather and/or develop information about specified directories and files in a manner conducive to intrusion analysis. It was designed to support the following initiatives: content integrity monitoring, incident response, intrusion analysis, and computer forensics.

jailed
Added 2004-04-30
by Johan Lindh
jailed implements a nonprivileged jailroot. It allows an environment to be specified, does std(in/out/err) redirection, and can restart a failed child.

Qryptix
Added 2004-04-28
by Sivasankar Chander
Qryptix consists of a PAM object and utilities for session- and key-management for encrypted home directories using the International Kernel (CryptoAPI) patches for Linux. It simplifies login/logout, mounting/unmounting, and key generation and changing.

PHP Service Monitor
Added 2004-04-26
by Vidyut Luther
PHP Service Monitor is a basic server/service monitor where you specify what server and what services you want to monitor for each specific server. It will monitor the services, and notify you via email and GUI if the service is down.

Epylog
Added 2004-04-14
by Konstantin Riabitsev
Epylog is a log notifier and parser that periodically tails system logs on Unix systems, parses the output in order to present it in an easily readable format (parsing modules currently exist only for Linux), and mails the final report to the administrator. It can run daily or hourly. Epylog is written specifically for large clusters where many systems log to a single loghost using syslog or syslog-ng. Although Epylog can be used on standalone systems, other packages (like logwatch) are probably better suited for such purposes.

CRM114
Added 2004-03-29
by Crah the Merciless
CRM114 is a Controllable Regex Mutilator and Smart Filter, designed for easy creation of filters for things like incoming mail, system logs, or monitoring processes. Filtering rules can be either hard-coded (such as regexes), soft-coded (calculated at runtime or read from an external file or process), or learned dynamically by phrase matching (by SBPH hashing). This makes it possible to create very accurate filters with very little actual work.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus