(Page 2 of 7)   < Prev  1 2 3 4 5 6 7  Next >

Category: Access Control » user privileges

Jail Chroot Project
Added 2004-02-09
by Juan M. Casillas
Jail is a chrooted environment engine, designed to easily build a full chrooted environment.

CVS-SSH2 Plug-in for Eclipse
Added 2004-02-05
by ymnk
CVS-SSH2 Plug-in for Eclipse is an Eclipse plug-in to allow CVS access on an encrypted session by SSH2 protocol.

Added 2004-01-26
by Alec Thomas
op allows fine-grained control of access to super-user privileges through easy to remember mnemonics. Its features include user and host based access control, and command expiration.

CPU - Change Password Utility
Added 2004-01-12
by Blake Matheny
CPU is an LDAP user management tool based on FreeBSD's pw(8). CPU allows you to add or delete users from an LDAP directory as defined by RFC 2307 . You may use MD5, SHA1, or Crypt for a hashing scheme. CPU also allows you to take existing users from a Unix-style passwd file and import those users into the directory.

Fingerprint Verification System
Added 2003-12-29
by Shivang Patel
Fingerprint Verification System is an easy-to-use library that allows programmers to integrate fingerprint technology into their software without specific know-how. It is fast and small, and is great for embedded systems.

Added 2003-12-09
by Rainer Wichmann
hsftp is an ftp emulator that provides the look-and-feel of an ftp session, but uses ssh to transport commands and data. hsftp executes UNIX commands on the remote host, and thus will fail on non-Unix remote hosts. If hsftp is not set SUID root, and you have supplied a password/passphrase, it might get paged out to your swap partition during prolonged inactivity. For security, hsftp can be compiled to drop SUID root privileges irrevocably on startup, immediately after locking the memory for the password. For RSA authentication, you can avoid to have hsftp caching the passphrase if you use ssh-agent. In this case, you can use hsftp securely without setting it SUID root. hsftp has been developed on Linux. It is known to compile on a variety of other UNIX flavours (at least FreeBSD, Solaris, AIX, and HP-UX), but may not work on all. Fixes for portability are welcome for inclusion.

Tiny SHell
Added 2003-09-12
by Christophe Devine
Tiny SHell is a lightweight client/server clone of the standard remote shell tools (rlogin, telnet, ssh, etc.). It provides remote shell execution and file transfers. It is 8-bit clean, has full support for pseudo-terminal pairs (pty/tty), and uses simple xor encryption. Most Unix platforms are currently supported (Linux, BSD, OSF, SunOS, and IRIX).

Added 2003-08-28
by Mezcalero
pam_dotfile is a PAM module which allows users to have more than one password for a single account, each for a different service. This is desirable because many users have objections to using the same password for (as an example) an IMAP4 mailbox and SSH access.

Added 2003-07-08
by pizzacoder
rssh is a small shell that provides the ability for system administrators to give specific users access to a given system via scp or sftp only.

Added 2003-05-01
by Solar Designer
msulogin is the single-user mode login program used to force the console user to login under a root account before a shell is started. Unlike other implementations of sulogin, this one supports having multiple root accounts on a system. msulogin has been developed as a part of Openwall GNU/*/Linux and is being made available separately primarily for use by other distributions. Currently, msulogin supports only systems with shadow passwords and getspnam(3).

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus