(Page 5 of 7)   < Prev  1 2 3 4 5 6 7  Next >

Platform: True64 UNIX

Added 2001-10-22
by RL "Bob" Morgan, Roland J. Schemers III
fping is a ping(1) like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up. fping is different from ping in that you can specify any number of hosts on the command line, or specify a file containing the lists of hosts to ping. Instead of trying one host until it timeouts or replies, fping will send out a ping packet and move on to the next host in a round-robin fashion. If a host replies, it is noted and removed from the list of hosts to check. If a host does not respond within a certain time limit and/or retry limit it will be considered unreachable.

GCC Bounds Checking Extensions
Added 2001-10-22
by Herman ten Brugge

Added 2001-10-22
by Gomez Henri
Jonama is a network relay, that utilizes SSL to authenticate and encrypt connections between two points. It uses SSL v2/v3/TLS from SSLeay or OpenSSL. In addition, it contains a CA mode to allow it perform access control based on certificates.

Added 2001-10-22
by Weitse Venema
Chrootuid is a wrapper program designed to protect hosts from network compromise. By running a daemon under the chrootuid wrapper, if the daemon results in a remote compromise, the access acquired will be severely limited. Chrootuid utilizes the chroot() mechanism to allow the daemon to run in its own, contained sand box. If an attacker gains access to a host via a chroot'ed daemon, they will only have access to a specific subset of tools and capabilities, as provided in the chroot directory set by the wrapper.

CU Sudo
Added 2001-10-22
by Todd Miller
Sudo is a utility that allows administrators to give limited access to root privileges to users, and log activity associated with the use of sudo. This allows for giving people the access they need, without the need to give full root access.

Added 2001-10-22
by Bronc Buster
cgiscan.c is another simple program which facilitates the scanning of hosts on a network for known cgi vulnerabilities. It let's the user know whether or not a given cgi was found on the host.

Added 2001-10-22
by David Lyer
Checker will scan a set of IP addresses for a configurable set of ports, and generate a report detailing what is and is not running properly. The output is highly configurable, and allows for the mailing of the results to a specifiable address.

Added 2001-10-22
by Paul McGinnis
findomains.c is a simple program to find the names associated with a class C worth of IP's.

Added 2001-10-22
by ben-z
rvscan is a remote vulnerability scanner. It checks for a number of recent remote vulnerabilities in a variety of Unixes. Unlike most commercial scanners, it uses real exploits to check for the vulnerabilities.

Added 2001-10-22
by Corey Satten
Subinfo is a shell script which utilizes nslookup to dump all information about a domain, and its subdomains.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus