(Page 5 of 5)   < Prev  1 2 3 4 5 

Category: System Security Management » Monitoring

e-Surveiller
Added 2004-07-22
by SurveilleTech Software
e-Surveiller is a powerful user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time. It stealthily records all keystrokes, web site visits, AOL, AIM,

MaxPatrol
Added 2004-07-15
by Positive Technologies
MaxPatrol is a professional network security scanner distinguished by its uncompromisingly high quality of scanning, optimized for effective use by companies of any size (serving from a few to tens of thousands of nodes). It supports vulnerability testing for servers with non-standard configurations, intelligent recognition of vulnerabilities in known (and custom)web-server scripts, full identification of RPC services and more.

Wasabi
Added 2004-06-21
by Andrea Barisani
Wasabi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Additionally, uninteresting fields in the log lines (such as PID numbers) can be masked with the standard regular ex

LogMonitor
Added 2004-05-26
by Adam Richard/SÚcurIT Informatique Inc.
LogMonitor is a log analysis console. It is 75% based on LogIDS, excepted for the GUI which is a complete makeover. Instead of focusing on network location, LogMonitor presents the data in a set of floating windows grouped by application, which may be a more intuitive interface to some people. The analysis is performed by defining the fields of each log we are monitoring, and then by using these fields to define rules as to what is important data or not.

mysqlIPM
Added 2004-04-27
by Gary Wallis
mysqlIPM is a Web-based IP address, router, firewall, and quality of service manager. It includes provisions for MAC hardware addresses, and tftp files for router backup.

Luneta
Added 2004-03-26
by Glaucius Djalma Pereira Junior
Luneta is a Web-based host and system monitor which uses SNMP.

PARANIX
Added 2004-03-23
by BatByte Internet Software
PARANIX is a PARAnoid uNIX file monitor and alert system. It can index and check thousands of files in a matter of seconds. It is most commonly used as an intrusion detection system.

Dwall Firewall Generator
Added 2004-03-23
by dag
Dwall is an all-purpose firewall tool to generate an iptables firewall out of a simple configuration. It contains about 80 predefined services and comes with a simple 3 zone firewall example. It is designed to be easy to configure and manage without being limited to a specific network setup. It can handle as many interfaces as desired and allows you to create firewall rules that are portable between several firewalls.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus