< Prev 1 2 3 4 Next >
Category: System Security Management » Accounts
THC-Hydra - parallized login hacker is available: for Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support and is part of Nessus. Visit the project web site to download Win32, Palm and ARM binaries. Changes: important bugfix!
Windows 2000 and Windows XP come with drivers for several wireless LAN ("WLAN") adapters; installation requires only insertion of one of those adapters. Administrative privileges are not required, as no new drivers must be registered with the operating system. WaveLock assists in enforcing security policies by blocking access to these adapters, making it harder to circumvent firewalls, filters, proxies, and other required safeguards. To install WaveLock, download and uncompress wavelock.zip. Execute the resulting wavelock.msi file (a Windows Installer setup), which installs wavelock.sys. Reboot to load and activate WaveLock. A list of the wireless network adapters supported out-of-the-box on Windows 2000 and Windows XP can be found below. Note that WaveLock cannot know about and will therefore not block additional drivers installed by administrators.
Opticon|Users 2002 is a simple tool to show administrators who is logged onto the network and from what workstation that user is accessing the network from. Information about the workstation used to logon from, the domain, the logon server, and the date/time of logon is also displayed. This tool makes it easy to spot unauthorized logons from a certain workstation or logons using an administrative account.
L0stat generates an statistical report of strength of NT accounts and passwords. This utility gets the L0phtCrack* result files or the LC3 exported text results file and treats the data to give the NT or security administrator a global view of security of their SAM database. As a way to discover NT passwords, L0phtCrack are LC3 great tools. But if you don't want to know the passwords themselves but the global security view of passwords quality, you should go one step beyond. For example, how you can evaluate the security level of an NT entreprise's database with 1000 accounts ? There is the place for L0stat. L0stat doesn't replaces L0phtCrack. L0stat is a reporting tool of data retrieved with L0phtCrack or LC3.
TecSec®'s Constructive Key Management technology uniquely resolves critical information security and information management matters complicated by today's vastly networked world. The need to identify authorized users, protect and control sensitive information assets, and restrict access to information in compliance with privacy statutes and regulations has never been greater.
Anomy Mail Sanitizer
Edit the security event log in Windows NT 4.0 and Windows 2000! WinZapper is the first tool (as far as we know) that will let you remove lines in the security log without clearing the whole log. And it will let you do this while Windows is running.
Allows setting of NT's User Account Policy of the local machine from the command line. It is almost functionally equivalent to the "Policy->Account" Menu in the User Manager tool, but is operated from the command line. It can set maximum and minimum password age, minimum password length, password history size, number of login attempts and time between them allowed before lockout, and the length that accounts are locked out. It can be used by domain logon scripts, at jobs, lockdown scripts and the like.
RACF PC-based Utilities
The 'RACF' utilities are text processing programs which take an IRRDBU00 ASCII flat file download from RACF and produces as output text reports and depending on the program JCL which can be checked, transfered back to mainframe and submitted. Please refer to the web page for notes on using the RACF utilities, and for the RACF.ini file (not included in the ZIP file).
smsotp is an authorization system based on SMS (Short Message Service). The system is the most reliable way of secure authorization. It eliminates all disadvantages of a typical login/password and any other otp implementations.
Browse by category