(Page 3 of 3)   < Prev  1 2 3 

Category: Authentication » Server

squidauth
Added 2001-10-22
by Peter Robinson and Anthony Cox
squidauth.pl is a Perl script that allows the Squid proxy server to authenticate to the TIS Toolkit firewall (or Gauntlet Firewall) authsrv using the authenticate_program parameter in the squid.conf.

PyMD5Pwd
Added 2001-10-22
by Shawn Farkas, software@sfarkas.net
PyMD5Pwd provides the md5pwd module for Python 1.5. It allows Python scripts to access passwords that are not stored with the crypt() algorithm, but rather with a MD5 hashing algorithm. PyMD5Pwd is not limited to simply accessing /etc/shadow or /etc/passwd; it can be used to create a seperate, secure, password database for your application.

Cistron Radius Server
Added 2001-10-22
by Miquel van Smoorenburg
Cistron RADIUS is an authentication and accounting server for terminal servers that speak the RADIUS protocol. The Cistron Radius server is mostly compatible with Livingston's 'radiusd-2.1', except without the s/key or menu support. It has additional features such as multiple DEFAULT entries with fall-through, a session database (who is online), the ability to limit connections on a per-user basis, and much more.

Xtradius
Added 2001-10-22
by Natalino Picone & Matteo Colombo
XtRadius is a freeware radius server implementation and its main feature is that it can handle user accounting & authentication informations via external fully configurable scripts. In this way you can write your own authentication and accounting routines without having to patch the radius server yourself.

NSBD - Not-So-Bad Distribution
Added 2001-10-22
by Dave Dykstra
NSBD, Not-So-Bad Distribution, is an automated Web-based distribution system that is designed for distributing free software on the internet, where users cannot trust the network and cannot entirely trust the maintainers of software. NSBD authenticates packages with GNU Privacy Guard (GnuPG) or "Pretty Good(Tm) Privacy" (PGP(Tm)) digital signatures so users can be assured that packages have not been tampered with, and it limits the maintainer to only update selected files and directories on the user's computer. NSBD's focus is on security, leaving as much control as is practical in the users' hands.

KeyNote Trust-Management System
Added 2001-10-22
by Angelos D. Keromytis, keynote@research.att.com
KeyNote provides a simple notation for specifying both local security policies and security credentials that can be sent over an untrusted network. Policies and credentials, called "assertions" as in PolicyMaker, contain predicates that describe the tr usted actions permitted by the holders of specific public keys. A signed assertion that can be sent over an untrusted network is called a Credential Assertion. Credential assertions, which serve the role of "certificates," have the same syntax as policy assertions with the additional feature that they are signed by the entity delegating the trust. A KeyNote evaluator accepts as input a set of local policy assertions, a collection of credential assertions, and a collection of attributes, called an "action environment," that describes a proposed trusted action associated with a set of public keys.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus