(Page 10 of 24)   < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >

Category: Utilities » Network

Local Area Security Linux
Added 2003-11-19
by Jascha
Local Area Security has released the 0.4 MAIN of their 'live CD' security toolkit which fits on a 185MB miniCD. With full Fluxbox desktop and over 250 security related tools encompassing pen testing, forensics, administration, monitoring, etc. Many additions and fixes have been made since the beta version. Along with the addition of the 'toram' boot option which allows it to be run entirely from RAM.

N-View
Added 2003-11-06
by Wolfgang Ullrich
N-View is a network monitor for small and medium-sized networks. It features automatic scanning of subnets for host addresses, monitoring of ICMP responses from all hosts, signalling of timeouts and delays in the GUI and by mail, a portscanner, an SNMP client (MIB browser and trap receiver), a graphical display of network traffic for network interfaces, connectivity to hosts by telnet, HTTP browser, or an arbitrary external program (such as ssh), printing of network diagrams, automatic generation of HTML pages, and more.

VPNmonitor
Added 2003-10-28
by Lloydxx
VPNmonitor is a Java application for observing network traffic. Its purpose is to stress the deficiency in wireless secure connections. Messages sent between computer nodes are graphically represented. VPN connections (PPTP and IPSec) and SSL connections (HTTPS) are shown in different colors, and messages that are not of the above types are dumped onto the screen. Connection statistics are collected during the monitor session.

jmark
Added 2003-10-22
by Akito Monden
jmark aims to easily identify illegal Java programs containing unlicensed class files. jmark provides a practical way for encoding and decoding a digital watermark into/from Java class files. Encoding a program developer's copyright phrase as a watermark ensures the legal ownership of class files.

fauxident.py
Added 2003-10-22
by Eleventh Hour
fauxident is a small Python script that will act as an extremely naive ident server, answering all ident requests with a consistent response (either ERROR or USERID). This can be advantageous on systems where running a true identd is unavailable, where it would be would be a security risk, or when masquerading firewalls are in use, where multiple machines are involved behind the firewall and running a proper ident system is not an option.

MD5Guard
Added 2003-10-01
by Alexander Portnoy
MD5Guard is the client-server application used for remote monitoring of file consistency via a network. It uses MD5 hash for consistency checking. The program consist of two parts: MD5Server and MD5Client. The host running the MD5Server periodically receives connections from the hosts that run the MD5Client. During the session, the MD5Server sends to the clients names of files, and the clients respond with their MD5 hash. The list of file names is configurable on a per-client basis. Any abnormal behaviour or MD5 hash mismatch is logged via syslogd.

SysOrb
Added 2003-09-04
by oestergaard
SysOrb is a client/server package that can monitor servers remotely (such as Web servers), or monitor devices on servers (such as disks, memory, load, etc.). It will alert the administrators via e-mail or pager if a server is entering a critical condition, and has its own database backend, allowing for massive collection of system statistics.

lifstat
Added 2003-08-26
by Frank Fejes
lifstat is a small Linux utility that reads /proc/net/dev and reports input and output statistics for available network interfaces over a repeating time interval, similar to the BSD 'netstat -i' command.

Ups shutdown script
Added 2003-08-22
by Ben Kelly
Ups shutdown script is a set of bash scripts that can be used to monitor a SNMP UPS and shut down servers if the power goes out. One of the scripts can run on a monitoring server and will report back when a UPS has gone offline.

OpenVPN
Added 2003-08-06
by James Yonan
OpenVPN is a robust and highly configurable VPN (Virtual Private Network) daemon which can be used to securely link two or more private networks using an encrypted tunnel over the Internet. OpenVPN's principal strengths include wide cross-platform portability, excellent stability, support for dynamic IP addresses and NAT, adaptive link compression, single TCP/UDP port usage, a modular design that offloads most crypto tasks to the OpenSSL library, and relatively easy installation that in most cases doesn't require a special kernel module.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus