(Page 2 of 10)   < Prev  1 2 3 4 5 6 7  Next >

Category: Utilities » Filesystem

DiskInternals Uneraser
Added 2004-10-08
by Alexey Babenko
DiskInternals Uneraser can recover any deleted file, including documents, photos, mp3 and zip files, or even folders and damaged disks. In addition to HDD, the program supports any type of storage media (music sticks, cameras, flash drives, USB drives, etc)! It works with encrypted files and helps you undelete file lost because of a virus attack or an employee's malicious behavior. No special skills needed; 100% free to try.

DiskInternals NTFS Reader
Added 2004-10-08
by Alexey Babenko
Provides read access to NTFS disks from Windows 95, 98 and Me. Allows you to save any files to any disk visible on the system or on the network. Supports saving compressed or encrypted files. While saving, it ignores file security policies. It means that it is possible to access absolutely any file on a NTFS disk from Windows 9x.

Added 2004-07-19
by Global Data Integrity
Xintegrity makes it virtually impossible for anybody or anything to modify your files without being detected. When Xintegrity detects a modified file it will show exactly how and when the file was modified and display the contents of the modified file in comparison with an optionally backed up copy of the file. All your files [including operating system files] can be protected. Xintegrity can automatically create protected backup files [optionally encrypted with 256 bit]

Added 2004-04-27
by mcree
The kopkop daemon listens for encrypted, signed, and fully random-looking command packets. Only the fields essential for the packets' travel trough the Internet are filled with "sane" data. Upon reception and after a preset timeout, the daemon executes user-defined commands. This can be used to open firewalls, so you can reduce your system's attack surface by hiding certain services until you need to use them. The kopkop client creates and sends the encrypted packets, and is included. The communication is strictly unidirectional and quite minimal between the client and the server. Replay attacks are forestalled by storing and comparing monotonically increasing packet IDs on both sides.

Snort Alert Monitor
Added 2004-03-24
by Sam Freiberg
SAM is a real-time Snort alert monitor. It provides many ways to indicate that you may be experiencing an intrusion attempt on your network, including audio/visual warnings, email warnings, etc.

BitDefender Remote Admin
Added 2004-03-02
by BitDefender
BitDefender Remote Admin is a webmin module to manage BitDefender for Linux Solutions (antivirus and antispam) for mail and file servers.

Added 2004-02-12
by dkocher
Cyberduck is an SFTP (SSH Secure File Transfer) and FTP browser. It lets you open connections to multiple servers using a document-based interface. A simple "favorites" manager allows you to store frequently-used servers. Drag-and-drop is supported for both downloading and uploading files; just drag the file(s) or folder from the Finder to the browser window (or vice versa) to start the transfer. File deletion and renaming and checking and changing of permissions is possible with a Finder-like information panel.

Added 2004-02-09
by Sébastien Godard
The sysstat package contains the sar, mpstat, and iostat commands for Linux. The sar command collects and reports system activity information. This information can also be saved in a system activity file for future inspection. The iostat command reports CPU statistics and I/O statistics for tty devices and disks. The statistics reported by sar concern I/O transfer rates, paging activity, process-related activites, interrupts, network activity, memory and swap space utilization, CPU utilization, kernel activities, and TTY statistics, among others. Both UP and SMP machines are fully supported.

Added 2004-01-16
by Christoph Hohmann
CryptoFS is a encryption filesystem for the Linux Userland Filesystem. Files written to the mount point will be stored encrypted (data and filename) in a directory on a normal filesystem.

Added 2004-01-02
by Andreas Schoenberg
ftp.proxy is an application level gateway for FTP. It allows either forwarding to a specific host or optional client side server selection w/o allowed host list, access and command control trough external programs.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus