(Page 5 of 40)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: System Security Management

Active Last Logon
Added 2006-05-16
by Desert Willow Technologies
Active Last Logon adds a tab to Active Directory Users and Computers displaying the most accurate and up to date last logon date and time for a user. It works by polling all domain controllers in the domain to get the most recent value for the non replicated Active Directory attribute lastlogon.

OSSEC
Added 2006-05-12
by Daniel B. Cid
OSSEC HIDS is an Open Source Host-based Intrusion Detection System. It performs log analysis and correlation, integrity checking, rootkit detection, time-based alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, Solaris and Windows.

FileMonService
Added 2006-05-10
by Young-il Kim(CISA,CISSP)
Windows File Monitor Service : created, changed, deleted, renamed and created-auto-removed on DotNet(.NET)

WSTOOL(Web vulnerable scan tool)
Added 2006-05-10
by Young-il Kim(CISA,CISSP)
Web vulnerable scanner (For ASP + SQLSERVER) - SQL injection - XSS Cross Site Scripting - 404/500 server error - Admin/Manage folder search - web-base or command-line scanner by PHP - Check up collate with HTML FORM and LINK

cenfw
Added 2006-05-02
by Peter Robinson
The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules. Now with Snat, Dnat and Masq Functionality. Many other bug fixes.

darc - Distributed Aide Runtime Controller
Added 2006-04-24
by Jacob Martinson
darc is a multi-threaded Python application designed for managing AIDE installations in large heterogeneous networks. It provides centralized database management, unified reporting, and eliminates the need to maintain Aide databases and binaries on read-only media.

GeSWall Server Edition
Added 2006-04-03
by GentleSecurity
With GeSWall Server Edition, you can harden your Web, Mail and SQL Servers. Hardening implies an isolation security policy that prevents damage from targeted intrusions and effectively precludes various attacks, known and unknown. Built on proven technology, GeSWall Server Edition provides powerful features to manage its security policy by means of Microsft Windows Group Policy and Active Directory.

FireMon
Added 2006-03-27
by Secure Passage
FireMon, is an Enterprise Security Management application that provides visibility to and control of network changes, configurations, and performance. Designed as a security tool, FireMon monitors configurations, evaluates configuration effectiveness, and alerts administrators to changes in configurations. FireMon controls devices by implementing intelligent device information processing and combining it with input from technical experts and customer requirements. FireMon meets key needs of security professionals, particularly security managers, auditors, security administrators, and network professionals with security concerns.

Virtual Screen Spy
Added 2006-03-23
by Virtual Software LTD
Virtual Screen Spy is a computer surveillance utility that performs continuous screen capture. Similar to a surveillance camera, Virtual Screen Spy captures images of your computer screen. Virtual Screen Spy takes a screenshot of the monitored windows user as selected in the screen capture control panel. The snapshots will be taken continuously every several seconds (adjustable), while being undetected by the monitored users. Virtual Screen Spy supports both English and French.

XNmap
Added 2006-03-22
by Nathaniel Ritmeyer
A GUI for nmap, written in Cocoa

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus