(Page 5 of 6)   < Prev  1 2 3 4 5 6  Next >

Category: Replacement

Sfingerd
Added 2001-10-22
by Laurent Demailly
sfingerd is a secure replacement for the standard unix finger daemon. The goal is to have the smallest and safest code.

SRA (Secure RPC Authentication for TELNET and FTP)
Added 2001-10-22
by Texas A & M University
This package provides drop in replacements for telnet and ftp client and server programs, which use Secure RPC code to provide encrypted authentication across the network, so that plaintext passwords are not used. These programs require no external keyserver or ticket server and work equally well for local or internet wide connections.

tftpd
Added 2001-10-22
by Scott M. Ballew
This version of tftpd is hacked from the 4.3 Reno tftpd. The author modified original source code since all of the versions that did a chroot() were unable to then syslog who got what file because of a rather obnoxious subtlety in the way 4.3 syslog works. This version has several improvements. 1.) chroot() to a restricted subdirectory. 2.) syslog() logs all accesses (and failures) to include the accessor, the file, and the access type. 3.) likely to have the ability to control which files or subdirectories of the tftp directory were accessible to which clients based on the incoming IP address.

gated
Added 2001-10-22
by Cornell University
A network routing daemon that understands the BGP, EGP, RIP RIP II, OSPF, and HELLO protocols. This version of gated is more configurable than the routed program that comes with most UNIX systems and can be useful when constructing firewalls. This replacement also avoids a number of security vulnerabilties historically present in versions of routed(8).

fingerd
Added 2001-10-22
by Mike Shanzer
This is a more security functional version of fingerd than is shipped with some older versions of UNIX. This version offers: logging, access control lists, for restricting finger requests to certain hosts and certain users, and a message of the day file.

LPRng
Added 2001-10-22
by Patrick Powell
The LPRng software is an enhanced, extended, and portable implementation of the Berkeley LPR print spooler functionality. While providing the same interface and meeting RFC1179 requirements, the implementation is completely new and provides support for the following features: lightweight (no databases needed) lpr, lpc, and lprm programs; dynamic redirection of print queues; automatic job holding; highly verbose diagnostics; multiple printers serving a single queue; client programs do not need to run SUID root; greatly enhances security checks; and a greatly improved permission and authorization mechanism. For users that require secure and/or authenticated printing support, LPRng supports Kerberos V and/or PGP authentication methods. Additional authentication support is extremely simple to add.

Npasswd
Added 2001-10-22
by Clyde Hoover
Npasswd is a pretty-much-plug-compatable replacement for passwd(1). This version incorporates a password checking system that disallows simple-minded passwords.

passwdd
Added 2001-10-22
by Anders Ellefsrud
This package consists of two parts. One server based passwd/chsh/chfn replacement, and a server based /etc/group editor which gives each and every user the ability to privately manage one group on his own. Requires perl.

xping 2.1
Added 2001-10-22
by Todd Allen
xping presents a list of computer systems with a graphic indication of whether or not each system is alive (that is, responsive to ICMP ECHO_REQUEST datagrams or ``pings''). Each system in the list is checked automatically with a period which can be controlled with command line arguments or X11 resources.

HyperTrace
Added 2001-10-22
by AnalogX
AnalogX HyperTrace is a GUI version of traceroute, which shows you the route that information travels from your machine to another machine on the internet. HyperTrace is also faster, and not just a little bit; an average of 20-30x faster than before. It displays each hop, machine name, machine response time, and the route TTL.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus