(Page 9 of 22)   < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >

Platform: NetBSD

Secure Cryptographic Instant Messaging
Added 2002-08-07
by The Project SCIM team
The Project SCIM application allows you to send Encrypted Instant Messages to your friends and other contacts. The software is free for non-commercial users and contains a load of cool features.

FCheck
Added 2002-07-31
by Michael A. Gumienny
FCHECK is a very stable PERL script written to generate and comparatively monitor a UNIX system against its baseline for any file alterations and report them through syslog, console, or any log monitoring interface. Monitoring events can be done in as little as one minute intervals if a system's drive space is small enough, making it very difficult to circumvent. This is a freely-available open-source alternative to 'tripwire' that is time tested, and is easier to configure and use.

Exec Denier
Added 2002-05-15
by Mihai Chelaru
Exec Denier is a NetBSD kernel module that restricts exec syscalls for certain UIDs. It is very useful for blocking exec calls for named and ntpd. It can also restrict exec calls for users to a certain directory.

NetUP UTM billing system
Added 2002-05-10
by Evgeniy
NetUP UTM is a billing system for Internet Service Providers and home networks. It provides a complex and flexible management tool for administrators. The system works on any UNIX- based system, and is tested on FreeBSD, Linux, and Solaris. It features a friendly administrator and user Web interface. Traffic data can be obtained from the interface of a PC router or from a Cisco router.

netcat (unix)
Added 2002-05-09
by Hobbit
Netcat is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities. Perhaps some equivalent to netcat, or "nc" should have been written and distributed ten years earlier as another one of those cryptic but fundamental Unix tools that we all use daily without even thinking about it.

Network Security Analysis Tool
Added 2002-05-06
by Mixter
nsat is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine, and much more. Unlike many other auditing tools, it can collect information about services independently of vulnerabilities, which makes it less dependent on frequent updates as new vulnerabilities are found.

IP Filter
Added 2002-05-01
by ondruska
IP Filter is a TCP/IP packet filter, suitable for use in a firewall environment. To use, it can either be used as a loadable kernel module or incorporated into your UNIX kernel; use as a loadable kernel module where possible is highly recommended. Scripts are provided to install and patch system files, as required.

ssmart
Added 2002-04-29
by dac
ssmart is a little Perl script to store a secure shell identity/cfs passwords blowfish encrypted to a smartcard. There will be no local copy of your identity on your hard drive, or even worse on an NFS share. It also allows you to quick mount all stored cfs directories, and it has a GNOME GUI (useful if you want it to use it with your .xinitrc). It uses the smartcard program to interact with the chipdrive.

mmftpd
Added 2002-04-25
by Matthew Mondor
mmftpd is a secure FTP server that runs as a normal user, and supports virtual users only. Each user may have specific permissions, and the daemon uses libpth for portable threads instead of fork(). It runs on both BSD and Linux systems, and is ideal for a setup with many Web virtual host customers. It was written from scratch, with no borrowed code.

Reliable SSH Tunnel
Added 2002-04-23
by Amram Bentolila
RSTunnel (Reliable SSH Tunnel) allows you to tunnel through data between two networks in a secure and encrypted tunnel. It uses SSH to connect the two machines. This will setup a tunnel for you, and make sure that it's constantly running.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus