(Page 1 of 5)   1 2 3 4 5  Next >

Category: Access Control » File System

OSSEC HIDS
Added 2009-02-27
by Third Brigade
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.

Windows Permission Identifier
Added 2006-01-18
by Nathan House
This tool enables administrators and penetration testers to review and audit the permissions of users on a windows machine. Windows Permission Identifier can check; File ACLs Folder ACLs Registry ACLs Services Permissions Shares Installation rights Internet Access and so on. The GUI enables the administrator to create policies that can be saved in XML format. The windows machines permissions are then checked against this policy. This enables administrators to run checks against existing organisational windows security baseline documents. Policies can be saved in XML format and all results can be exported for further use. WARNING: The policy that is included is a sample of the functionality of the tool. It is not a security policy that should be followed. Report Bugs & send your own policy files : nhouse[at]stationx.net It would be very useful to the community if you send me any policies you create. For example, Web server, desktop, domain controller or what ever you create. I will upload your policy files to the site and credit you.

EagleEyeOS Professional
Added 2006-01-13
by EagleEyeOS Llc.
This file and data security software provides solutions for the problems that occupy every IT security specialists on the world caused by development of the data transmission and increasing size of the built-in memories in data storage devices. The software blocks data larcenies with determining the access rights, prohibiting the unauthorized access and identifies the entitled person, who abuses the sensitive and/or classified information.

EagleEyeOS One
Added 2006-01-13
by EagleEyeOS Llc.
The assorted function capacity comprises above all the monitoring and blocking of external devices and storages, additionally protects against data leakage. It is a quick and efficient, and simple solution to protect electronic data and documents and it is easy-to-install for single-computer systems and smaller networks.

SafeSystem
Added 2005-02-09
by GemiScorp Software Solutions
SafeSystem is a security program that allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. SafeSystem can make your files and folders completely invisible, inaccessible or simply read-only. Furthermore, SafeSystem can prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC will be healthy

filewatcher
Added 2004-03-11
by Mark Nagel
filewatcher is a Perl program that uses RCS to maintain a local file archive repository. A configuration file details which files and directories to monitor and to whom reports should be delivered.

FireHOL
Added 2003-10-14
by Costa Tsaousis
FireHOL is a script producing stateful iptables firewalls. It can control any number of internal/external interfaces, offers control on any combination of routed traffic, sets up DMZ routers and servers and all kinds of NAT, provides strong protection (flooding, spoofing, etc), transparent caches, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

Private
Added 2003-09-12
by drugphish
Private is a kernel module which uses the LSM hooks to implement configurable, 4.4BSD-like securelevels for Linux. It gives users control over ptrace, module loading/ unloading, mounting filesystems, file permissions, and changing system time much like the securelevels known on BSD systems.

Blue dot
Added 2003-06-12
by Matti Tukiainen
Blue dot is a CGI tracking and Web site activity measurement script which generates Apache combined style access log files. These log files can be analyzed with most standard log analysis tools to track a site's popularity, referrers, hosts, etc. The logging is based on inserting a small piece of JavaScript or SSI code into every Web page. This code requests a very small blue dot image from a server where the call is logged. Blue dot can also be configured to set and log session and persistent cookies. This can be used, for example, to track pay-per-click search engine ROI.

Encrypted Virtual File System
Added 2003-05-22
by sd
EVFS is a Linux virtual filesystem which sits on top of VFS to access the underlying filesystem. This means users can mount any directory containing encrypted data to any other directory (=clone), but the second will be encrypted/decrypted transparently until it is unmounted. It has multi-user support so that regular users can mount their own evfs filesystems from and to directories they own. Therefore it's possible to have a totally encrypted filesystem, each user with their own key.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus