(Page 4 of 23)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Platform: SunOS

FW1-Loggrabber
Added 2004-02-12
by Torsten Fellhauer
FW1-Loggrabber is a simple LEA (Log Export API) client for Checkpoint Firewall-1. It was developed to access Firewall-1 Logfiles from commandline from any host in the network. Without an LEA client you can only access logs with graphical Checkpoint Tools or via commandline directly on the Firewall-1 machine. The primary goal was to automate reports of FW-1 logs with LIRE.

Caudium
Added 2004-02-09
by Caudium
Caudium is a single process multi-threaded Web server. It has a built-in pre-processing language and an early stage of XSLT-support. The server also comes with a fast log parser. Configuration is easily done using a WWW-GUI.

LSH
Added 2004-02-09
by Niels Möller, nisse@lysator.liu.se
lsh is an implementation of the SSH protocol version 2. It is under active development. Developer contributions are welcome from both inside and outside the US.

Jacksum
Added 2004-02-02
by jonelo
Jacksum is a free checksum utility entirely written in Java. It supports most common checksum algorithms (Adler32, BSD sum, POSIX cksum, CRC-16, CRC-32, MD2, MD5, SHA, and Unix System V sum).

Wipe
Added 2004-01-11
by linux
Recovery of supposedly erased data from magnetic media is easier than what many people would like to believe. A technique called Magnetic Force Microscopy (MFM) allows any moderately funded opponent recover the last two or three layers of data written to disk. Wipe repeadetly overwrites special patterns to the files to be destroyed, using the fsync() call and/or the O_SYNC bit to force disk access.

Big Brother
Added 2004-01-06
by Sean MacGuire, sean@iti.qc.ca
Big Brother is a combination of monitoring methods. Unlike SNMP where information is just collected and devices polled, Big Brother is designed in such a way that each local system broadcasts its own information to a central location. Simultaneously, Big Brother also polls all networked systems from a central location. This creates a highly efficient and redundant method for proactive network monitoring.

libstatgrab
Added 2004-01-06
by Pete Saunders
The libstatgrab library provides an easy-to-use interface for accessing system statistics and information. Available statistics include CPU, Load, Memory, Swap, Disk I/O, and Network I/O. It was developed to work on Linux, FreeBSD, and Solaris. The package also includes two tools: saidar provides a curses-based interface for viewing live system statistics, and statgrab is a sysctl-like interface to the statistics.

CheckPoint FW1 VPN Tools (fw1vpntools)
Added 2003-12-29
by Steve Weinreich
fw1vpntools is a set of some nifty little helpers which can be used for monitoring and maintaining a VPN which is terminated with CheckPoint VPN-1 Firewalls.

nload
Added 2003-12-19
by Roland Riegel
nload is a console application which monitors network traffic and bandwidth usage in real time. It visualizes the in- and outgoing traffic using two graphs. It also provides additional information, such as the total amount of transfered data and the min/max network usage.

Firewall Builder for PIX
Added 2003-12-09
by Vadim Kurland
Firewall Builder for PIX hides the complexity of PIX command line interface and automatically configures options and parameters that usually make manual configuration a real chore. With this module, the same workstation running Firewall Builder can create and manage security policy on Cisco PIX firewalls, as well as on firewalls built with iptables, OpenBSD pf, or ipfilter.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus