(Page 6 of 22)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Platform: NetBSD

Big Brother
Added 2004-01-06
by Sean MacGuire, sean@iti.qc.ca
Big Brother is a combination of monitoring methods. Unlike SNMP where information is just collected and devices polled, Big Brother is designed in such a way that each local system broadcasts its own information to a central location. Simultaneously, Big Brother also polls all networked systems from a central location. This creates a highly efficient and redundant method for proactive network monitoring.

Added 2003-12-31
by Everton da Silva Marques, evertonm@my-deja.com
Portfwd is a small C++ utility which forwards incoming TCP connections and/or UDP packets to remote hosts. Multiple forwarders can be specified in a flexible configuration file. There is support for FTP forwarding.

ekkoBSD Firewall
Added 2003-12-29
by Rick Collette
ekkoBSD Firewall is a full-featured operating system with security enhancements, a state tracking packet filter, and a NAT firewall. Its features include firewall traffic shaping, an FTP proxy, an authenticating gateway, a complete logging facility, easy management with the administration tool set, IP address pooling (common address redundancy), and a state log daemon.

Added 2003-12-24
by embyte
Gspoof is a GTK+ program written in C language which makes easier and accurate the building and the sending of TCP packets with a data-payload or not. It's possible to modify TCP/IP fields and also ethernet header working to Link Level. You can send one or more packets together.

Added 2003-12-22
by Holger Weiss
pppusage summarizes PPP transfer volumes, number of connections, and (on BSD systems) online time. The data is collected by reading the syslog files which contain the ppp[d] messages. A database file is used to store the relevant data. Certain time ranges (that is: a year, month, or day) may be specified on the commandline.

Added 2003-12-19
by Roland Riegel
nload is a console application which monitors network traffic and bandwidth usage in real time. It visualizes the in- and outgoing traffic using two graphs. It also provides additional information, such as the total amount of transfered data and the min/max network usage.

Added 2003-11-26
by Niels Provos
Honeyd is a small daemon that creates virtual hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Honeyd enables a single host to claim multiple addresses on a LAN for network simulation. It is possible to ping the virtual machines, or to traceroute them. Any type of service on the virtual machine can be simulated according to a simple configuration file. Instead of simulating a service, it is also possible to proxy it to another machine.

Distributed Checksum Clearinghouse
Added 2003-11-20
by Vernon Schryver
Distributed Checksum Clearinghouse (DCC) is a system of clients and servers that collect and count checksums related to mail messages. The counts can be used by SMTP servers and mail user agents to detect and reject bulk mail. DCC servers can exchange common checksums. The checksums include values that are "fuzzy", or constant across common variations in bulk messages

PAM X509 Authentication Module
Added 2003-11-18
by Kain
This module provides password-less login authentication on local consoles based on X509 certificates and private keys stored on some personal data holders like USB sticks, Bluetooth mobile phones, etc. It currently supports authentication with a user certificate and private key in some auto-mountable location using supermount or automount, such as a USB stick, floppy disk, CD, SD card, etc., or from a Bluetooth device.

Added 2003-11-17
by Paul L Daniels,
Inflex is an email scanner which encapsulates your existing sendmail server setup. It scans both incoming and outgoing email and it does not alter your current /etc/sendmail.cf file. It can scan for email viruses, unwanted file types (eg. EXE, BMP, MPEG) and file names (eg. prettypark.exe). It can also be used to scan for text snippets within emails and to insert disclaimers into outbound emails.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus