(Page 6 of 7)   < Prev  1 2 3 4 5 6 7  Next >

Platform: True64 UNIX

Courtney
Added 2001-10-22
by Marvin J. Christensen
Courtney is a "ids" system, which monitors for SATAN probes and attacks. It receives its input from tcpdump, counting the number of new services a machine originates within a time window. If the threshold is exceeded by a host, it is flagged as a potential SATAN host.

scan-detector
Added 2001-10-22
by Christoph Schuba/Gene Spafford
Scan-detector is a simple detector for automated scans of TCP/ UDP ports on a host. It works by opening a socket on specified ports, and watches for a connection. When a connection is established, the host name, source port, destination host, destination port, and a number of other pieces of information are logged.

Flog ftpd log analyzer
Added 2001-10-22
by Ani Joshi
Flog is a simple ftpd log file analysis tool. It generates basic statistics about traffic and server utilization, which it outputs to a file.

Cistron Radius Server
Added 2001-10-22
by Miquel van Smoorenburg
Cistron RADIUS is an authentication and accounting server for terminal servers that speak the RADIUS protocol. The Cistron Radius server is mostly compatible with Livingston's 'radiusd-2.1', except without the s/key or menu support. It has additional features such as multiple DEFAULT entries with fall-through, a session database (who is online), the ability to limit connections on a per-user basis, and much more.

Xtradius
Added 2001-10-22
by Natalino Picone & Matteo Colombo
XtRadius is a freeware radius server implementation and its main feature is that it can handle user accounting & authentication informations via external fully configurable scripts. In this way you can write your own authentication and accounting routines without having to patch the radius server yourself.

John the Ripper (UNIX)
Added 2001-10-22
by Solar Designer
John the Ripper is a password cracker, currently available for UNIX, DOS, WinNT/Win95. Its primary purpose is to detect weak UNIX passwords.

Jonama
Added 2001-10-22
by Gomez Henri, nri@mail.dotcom.fr
Jonama is a network relay, that utilizes SSL to authenticate and encrypt connections between two points. It uses SSL v2/v3/TLS from SSLeay or OpenSSL. In addition, it contains a CA mode to allow it perform access control based on certificates.

ICMP Monitor
Added 2001-10-22
by Vadim Zaliva, lord@crocodile.org
ICMP Monitor is a tool that uses the ICMP echo facility to monitor hosts, and determine if they are up or down. In the event they are down, ICMP Monitor will notify the system administrator.

Sudo
Added 2001-10-22
by Todd Miller, Todd.Miller@courtesan.com
Sudo is a utility that allows administrators to give limited access to root privileges to users, and log activity associated with the use of sudo. This allows for giving people the access they need, without the need to give full root access.

httptunnel
Added 2001-10-22
by Lars Brinkhoff, lars@nocrew.org
httptunnel creates a bidirectional data channel through an HTTP proxy, from your isolated computer behind a restrictive firewall, to a system on the Internet you have access to.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus