(Page 6 of 7)   < Prev  1 2 3 4 5 6 7  Next >

Platform: SCO

GCC Bounds Checking Extensions
Added 2001-10-22
by Herman ten Brugge


Chrootuid
Added 2001-10-22
by Weitse Venema
Chrootuid is a wrapper program designed to protect hosts from network compromise. By running a daemon under the chrootuid wrapper, if the daemon results in a remote compromise, the access acquired will be severely limited. Chrootuid utilizes the chroot() mechanism to allow the daemon to run in its own, contained sand box. If an attacker gains access to a host via a chroot'ed daemon, they will only have access to a specific subset of tools and capabilities, as provided in the chroot directory set by the wrapper.

CU Sudo
Added 2001-10-22
by Todd Miller
Sudo is a utility that allows administrators to give limited access to root privileges to users, and log activity associated with the use of sudo. This allows for giving people the access they need, without the need to give full root access.

S/Key
Added 2001-10-22
by Neil M. Haller
The S/KEY one-time password system provides authentication over networks that are subject to eavesdropping/replay attacks. This system has several advantages compared with other one-time or multi-use authentication systems. The user's secret password never crosses the network during login, or when executing other commands requiring authentication such as the UNIX passwd or su commands. No secret information is stored anywhere, including the host being protected, and the underlying algorithm may be (and it fact, is) public knowledge. The remote end of this system can run on any locally available computer. The host end could be integrated into any application requiring authentication.

Sudo
Added 2001-10-22
by Todd Miller, Todd.Miller@courtesan.com
Sudo is a utility that allows administrators to give limited access to root privileges to users, and log activity associated with the use of sudo. This allows for giving people the access they need, without the need to give full root access.

Lsof
Added 2001-10-22
by Vic Abell, abe@purdue.edu
Lsof is a Unix-specific diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system.

httptunnel
Added 2001-10-22
by Lars Brinkhoff, lars@nocrew.org
httptunnel creates a bidirectional data channel through an HTTP proxy, from your isolated computer behind a restrictive firewall, to a system on the Internet you have access to.

Parent Logging Patch for sh(1)
Added 2001-10-22
by Omachonu Ogali
After this patch is applied to sh(1) and recompiled, every time it is executed it will log the parent process ID and name that is calling it. Useful in backtracking intrusions.

Cistron Radius Server
Added 2001-10-22
by Miquel van Smoorenburg
Cistron RADIUS is an authentication and accounting server for terminal servers that speak the RADIUS protocol. The Cistron Radius server is mostly compatible with Livingston's 'radiusd-2.1', except without the s/key or menu support. It has additional features such as multiple DEFAULT entries with fall-through, a session database (who is online), the ability to limit connections on a per-user basis, and much more.

Xtradius
Added 2001-10-22
by Natalino Picone & Matteo Colombo
XtRadius is a freeware radius server implementation and its main feature is that it can handle user accounting & authentication informations via external fully configurable scripts. In this way you can write your own authentication and accounting routines without having to patch the radius server yourself.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus