(Page 3 of 6)   < Prev  1 2 3 4 5 6  Next >

Category: System Security Management » Filesystem

Added 2004-02-24
by benasselstine
fileschanged is a command line file alteration monitoring tool that monitors sets of files and reports when they have changed. It can be used in shell scripts to take action when certain files have been altered.

Added 2003-10-01
by Alexander Portnoy
MD5Guard is the client-server application used for remote monitoring of file consistency via a network. It uses MD5 hash for consistency checking. The program consist of two parts: MD5Server and MD5Client. The host running the MD5Server periodically receives connections from the hosts that run the MD5Client. During the session, the MD5Server sends to the clients names of files, and the clients respond with their MD5 hash. The list of file names is configurable on a per-client basis. Any abnormal behaviour or MD5 hash mismatch is logged via syslogd.

Added 2003-07-31
by pixelbeat
FSlint is a toolkit to find various forms of lint on a filesystem. At the moment it reports duplicate files, bad symbolic links, troublesome file names, empty directories, non stripped executables, temporary files, duplicate/conflicting (binary) names, and unused ext2 directory blocks.

Added 2003-06-03
by Joerg Beckmann
The iiitAccessServer is a rule-based enterprise authorization system written in Java. It works as a server and is usable with any programming language able to open a socket. The server fetches its data from LDAP and stores it in optimized form in one or more MySQL databases, used as a persistent 2nd-level cache to achieve high performance. The entire system is designed to be scalable and fault-tolerant.

Easy Integrity Check System
Added 2003-05-26
by Aki Tossavainen
Easy Integrity Check System is a tool for system administrators that performs filesystem integrity checks. It is easy to set up and use, and makes use of the mcrypt and mhash libraries for encrypting its database.

Easy Firewall Generator
Added 2003-05-26
by Scott Morizot
Easy Firewall Generator is a PHP Web application that generates an iptables firewall script. The generated script is designed for a single system connected to the Internet or a system acting as a gateway/firewall for a small private network. The generator prompts recursively for a variety of options. When the selected options form a complete set, it generates and returns a ciommented firewall script based on those options. The generator includes documentation on iptables and each option.

Added 2003-05-22
by MainNerve
LFT (formerly FFT) is an alternative traceroute program for displaying the route packets take to an IP network host/socket. Unlike Van Jacobson's traceroute, which is available on almost every platform today, LFT uses TCP in order to elicit ICMP TIME_EXCEEDEDs or other IP route data. As a result, LFT often executes much faster and sees behind some configurations of firewalls. Its stateful engine lets the user know when it encounters a stateful firewall or other interesting conditions. It also does AS number and netblock name lookups en route. Most importantly, LFT can trace specific TCP-based protocol routes (not just IP) to assist network engineers with manual fault isolation of network application problems.

Added 2003-02-04
by BrandXDev
Recon is a general SSL watchdog, checking for common, certificate-related errors in SSL-enabled services. Provide it a list of SSL services for which you are responsible, run it periodically, and Recon will warn you of impending certificate expirations, mismatched certificate names, and unavailable services.

Added 2002-08-06
by Dokter Bob
Weblog is a parsing system for the log data which is generated by the Apache module mod_log_mysql. It generates detailed statistical data from the raw log, including resolving of hostnames. The statistical data is written to a relational database, making almost realtime custom-formatted dynamic statistics possible, using something like PHP or Zope.

Web shell
Added 2002-06-12
by Alex Dyatlov
Webshell is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus